HTTP418 InfoSec

Breaking stuff and writing about it

  • Red Teaming
  • AD CS
  • Recent Blog Posts
  • HTB Christmas CTF – Toy Workshop

    HTB Christmas CTF – Toy Workshop

    Overview Toy Workshop was a 1 star rated ‘Web’ challenge from the HackTheBox “Cyber Santa is Coming to Town” CTF. This was an interesting challenge, with the flag coming from a blind stored-XSS which led to the leakage of the flag from a cookie value in a Puppeteer instance. After that mouthful, lets take a […]

    HTTP418

    December 5, 2021
    CTF, HackTheBox
    cookies, ctf, cyber santa, flag, htb, puppeteer
  • AD CS – The ‘Certified Pre-Owned’ Attacks

    AD CS – The ‘Certified Pre-Owned’ Attacks

    Overview This post will cover the attacks detailed in the white-paper produced by SpecterOps. The most well-known of which is the ‘ESC8’ attack – where a standard domain user can escalate to Domain Admin, given a vulnerable environment. Before we begin with the main ‘Domain Escalation’ attacks (p. 54-81), we will quickly cover the THEFT5 […]

    HTTP418

    August 5, 2021
    Active Directory, AD CS
  • AD CS – What Can Be Misconfigured?

    AD CS – What Can Be Misconfigured?

    Introduction The aim of this post is to go into more detail on the attacks described within the excellent ‘Certified Pre-Owned’ blog post & whitepaper produced by SpecterOps. This post will show how to configure a test environment which is vulnerable to the attacks they describe. If you are unfamiliar with AD CS, I have […]

    HTTP418

    August 5, 2021
    Active Directory, AD CS
  • AD CS – The Basics

    AD CS – The Basics

    Introduction This post will cover the basics of Active Directory Certificate Services (AD CS) and how we can use certificates for offensive security. I have two other posts on this subject. The first of which covers some of the dangerous misconfigurations. And secondly, how we can actually perform the attacks. For those unfamiliar, AD CS […]

    HTTP418

    August 5, 2021
    Active Directory, AD CS
  • HackTheBox ScriptKiddie Walkthough

    HackTheBox ScriptKiddie Walkthough

    ScriptKiddie was an Easy rated Linux machine, which involved exploiting a vulnerability within MetaSploit, then gaining access to the pwn user and abusing a sudo misconfiguration. Getting A Shell Reconnisance Initial nMap scans showed a very simple box, with just SSH and port 5000 open. I personally find the -sV -A flags tend to reveal […]

    HTTP418

    June 5, 2021
    HackTheBox
    easy, htb, linux, walkthough, writeup
  • My OSCP Exam Experience & Tips

    My OSCP Exam Experience & Tips

    Here is a write up of my OSCP exam experience – from studying through to passing the exam. Overall, it was a worthwhile experience and I would recommend it to anyone interested in infosec! TL:DR Practise! IMO, the OSCP exam manual is too large and not worth the effort Proving Grounds is far better than […]

    HTTP418

    May 3, 2021
    Certifications
    kali, oscp, oscp exam, proving grounds, pwk
  • HTB Cyber Apocalypse – Emoji Voting Writeup

    HTB Cyber Apocalypse – Emoji Voting Writeup

    Emoji Voting was a 2-star rated ‘Web’ machine. The server was vulnerable to SQL injection, which allowed for the flag to be discovered. This was a fairly laborious process, as the SQL injection was after an ‘ORDER BY’ statement, which increased the complexity of exploiting it. Pwning Emoji Voting The website itself appears to be […]

    HTTP418

    April 24, 2021
    CTF, HTB Cyber Apocalypse CTF 2021
    ctf, cyber apocalype, emoji voting, hackthebox, htb
  • HTB CTF 2021 – Input as a Service Writeup

    HTB CTF 2021 – Input as  a Service Writeup

    Input as a Serivce (Iaas) 1-star rated challenge from the HackTheBox Cyber Apocalypse CTF. This challenge was from the ‘Misc’ section, in contrast to most of the others I attempted! This challenge revolved around a input function vulnerability in a Python web server, which could be exploited to achieve an RCE. Some initial poking around […]

    HTTP418

    April 24, 2021
    CTF, HTB Cyber Apocalypse CTF 2021
    apocalypse, ctf, cyber, htb, iaas, input, input as a service, python, python2, service, vulnerability, writeup
  • HTB CTF 2021 – MiniSTRyplace Writeup

    MiniSTRyplace was a 1-star rated ‘Web’ challenge from the HackTheBox Cyber Apocalypse CTF. The solution was pretty simple, with a vulnerable str_replace function allowing for a simple path traversal exploit. Initially, the files for the server were supplied as part of the challenge. From a quick initial search, the index.php file stood out as being […]

    HTTP418

    April 24, 2021
    CTF, HTB Cyber Apocalypse CTF 2021
    apocalypse, basic, ctf, hackthebox, htb, lfi, local file inclusion, ministryplace, path traversal, simple, str_replace, traversal, writeup
  • HTB Cyber Apocalypse CTF 2021 – BlitzProp Writeup

    BlitzProp is a 1* rated challenge from the web category of the HTB CTF. To exploit this, you need to use a ‘prototype pollution’ vulnerability in order to gain RCE against the target. This was the first time I had exploited a target using a vulnerability such as this, so I learned a lot from […]

    HTTP418

    April 24, 2021
    CTF, HTB Cyber Apocalypse CTF 2021
    2021, apocalypse, blitz, blitzprop, cyber, flat, hackthebox, htb, pollution, prop, prototype, pug, unflatten
←Previous Page
1 2