Reverse engineer a chat program and write a script to exploit a Windows machine.

Image for post
Image for post

NMAP Scan:

nmap -sC -sV -Pn -T4 10.10.175.210 — disable-arp -oX chatserver_nmap.xml

  • sC = default scrip scan
  • sV = version scan
  • n = disable DNS resolution
  • T4 = Aggressive scan

Exploit Jenkins to gain an initial shell, then escalate your privileges by exploiting Windows authentication tokens.

Image for post
Image for post

[1]NMAP Scan

sudo nmap -A -T4 10.10.131.184 -oN nmap_alfred


Utilize PowerShell commands and winPEAS to enumerate the system and collect the relevant information to escalate privilege.

Image for post
Image for post

Machine Information:


Walkthrough on exploiting a Linux machine. Enumerate Samba for shares, manipulate a vulnerable version of proftpd and escalate your privileges with path variable manipulation.

Image for post
Image for post

NMAP Scan:

sudo nmap -A -T4 [IP Address]


Learn about active recon, web app attacks and privilege escalation.

Image for post
Image for post

Machine Information:


Image for post
Image for post

In these set of tasks you’ll learn the following:
1. brute forcing
2. hash cracking
3. service enumeration
4. Linux Enumeration

Machine Information:


Exploitation using metasploit.

Image for post
Image for post

Information Gathering and Enumeration:

#NMAP Scan:
sudo nmap -A -T4 10.10.10.191 -oN nmap_blunder
-A =
Enable OS detection, version detection, script scanning, and traceroute.
-T4 = Set timing template (higher is faster).
-oN =output to file as Normal.
nmap_blunder = output file.


Image for post
Image for post
  1. Configure the Management Interface

ASAv(config)# interface management 0/0
ASAv(config-if)# nameif MGMT
ASAv(config-if)# security-level 100
ASAv(config-if)# ip address 192.168.100.1 255.255.255.0

2. Configure DHCP Service for Management Interface

ASAv(config)# dhcpd address 192.168.100.100–192.168.100.200 MGMT
ASAv(config)# dhcpd enable MGMT

5. Enable SSH access on inside Interface

To configure SSH access to the device, we must first create a username and password to the local device.

Commands:

ASAv(config)# username admin password cisco123
ASAv(config)# aaa authentication ssh console LOCAL
ASAv(config)# crypto key generate rsa
ASAv(config)# ssh 192.168.100.0 255.255.255.0 MGMT

TEST from the Management PC:


Disclaimer:

This walkthrough is intended for documentation purpose. This is in no way the most efficient way to crack this machine nor the most amazing one. I do such documentation solely for write up and grammar practice LOL. Happy hacking!

Image for post
Image for post

Machine Information:


Securing Cisco Switch Data Plane

Image for post
Image for post

This tutorial will show you how to secure your Cisco Switches from Internal attacks like MAC Spoofing, CAM Table Overflow, MITM, and DHCP Spoofing Attacks.

  1. Configure Endpoint Devices to Access ports to avoid trunking auto-negotiation. Only configure trunk ports that are going to other Switches or Routers.

Clarence Subia

Experienced Network Security Engineer with a demonstrated history of working in the field of IT security industry.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store