Cross-site WebSocket hijacking (CSWSH) | RC4 encryption

Cross-site WebSocket hijacking (CSWSH) | RC4 encryption

?? Cybersecurity Journey Update: Inkplot Challenge Completed on HackMyVM!

?? Watch the video here: Link to Video

I took on the Inkplot challenge, not as a tutorial but as a practice project to deepen my cybersecurity skills.

Here are the key steps I took:

  • Uncovered intriguing chat details, like Leila's interruption of Alice sharing MD5 hash with Bob.
  • Wrote a brute force script to recover the hash and password, granting SSH access as user Leila.
  • Discovered 'Leila' can execute script as 'Pauline'. Explored RC4 encryption vulnerability for access.
  • Leveraged RC4 weakness to access Pauline's id_rsa key, then found the 'admin' group and access to 'system-sleep' folder.
  • Designed script for SUID permission to bash shell, achieving ROOT access and completing the 'inkplot' machine!

Learning and practicing concepts in action! ??????

#Cybersecurity #hackmyvm #infosec #informationsecurity #ethicalhacking #security

要查看或添加评论,请登录

KEVIN VANEGAS的更多文章

  • LittlePivoting-Dockerlabs Walkthrough / WriteUp

    LittlePivoting-Dockerlabs Walkthrough / WriteUp

    Hello everyone, we continue exploring the Dockerlabs DockerLabs platform that I introduced in my previous video! This…

    5 条评论
  • AS-REP roasting with Crackmapexec/NetExec

    AS-REP roasting with Crackmapexec/NetExec

    This new Crackmapexec/NetExec series is a part of the Active Directory Lab series on my channel . With tools like…

  • Vulnerable Active Directory Lab

    Vulnerable Active Directory Lab

    I'm currently learning pentesting techniques for Active Directory, and I've been sharing my progress on YouTube. Today,…

  • Enumeration With BloodHound

    Enumeration With BloodHound

    As a cybersecurity student, I'm constantly seeking ways to expand my knowledge and skill set. Recently, I delved into…

  • Learning About DCSync Attacks in Active Directory

    Learning About DCSync Attacks in Active Directory

    I continued diving into exploitation techniques within Active Directory. Here are the key highlights: 1?? DCSync…

  • Set Up and Test ASREProast and Kerberoasting Attacks

    Set Up and Test ASREProast and Kerberoasting Attacks

    We create a small Active Directory lab using VirtualBox and a Windows Server Standard evaluation. We'll configure it to…

  • My notes on solving 'Return' from Hack The Box.

    My notes on solving 'Return' from Hack The Box.

    > The machine Key Concepts: Windows Remote Management (WinRM), SMB (Server Message Block), Enumeration, Printer Admin…

  • Creating a basic bash script

    Creating a basic bash script

    I'll show you how to create your first Bash script to perform a small fuzzing operation with the goal of gaining access…

  • Linux `find` Command

    Linux `find` Command

    ███████████████████████████████ ███ Linux `find` Command ███…

  • Dominating 3 Buffer Overflows on a Single Machine

    Dominating 3 Buffer Overflows on a Single Machine

    During my journey, I encountered a host of vulnerabilities, including local file inclusion, log poisoning, and the…

社区洞察

其他会员也浏览了