Skip to main content

Posts

Showing posts from June, 2021

Polkit: CVE-2021-3560

 tryhackme -Polkit: CVE-2021-3560 #1 :- Read the information in the task. What is the URL of the website you should submit dynamic flags to? Answer :- https://flag.muir.land/  #2 :- In what version of Ubuntu's policykit-1 is CVE-2021-3560 patched? Answer :- 0.105-26ubuntu1  #3 :- What program can we use to run commands as other users via polkit? Answer :- pkexec  Exploitation Process   follow the steps.... #4 :- Root Flag    Answer :- THM{N2I0MTgzZTE4ZWQ0OGY0NjdiNTQ0NTZi}

Reversing ELF

 Tryhackme - Reversing ELF   Crackme1   Run the program chmod 777 crackme1 ./crackme1   #1 :- What is the flag? Answer :- flag{not_that_kind_of_elf} 

Reverse Engineering

Tryhackme - Reverse Engineering   crackme1  hint :- did you check the strings stored in the executable?   ./crackme1.bin chmod 777 crackme1.bin Now I have the answer.     strings crackme1.bin    Let’s debug, r2 -d ./crackme1.bin and ..Analyze command - aaa then afl is list of functions  and There’s a main function. There’s password declaration and strcmp function.    pdf @main   Let’s look into variable’s value. Set breakpoint at strcmp   db 0x56163a9737c7   dc pdf @main   Now I have breakpoint. px @ rsi There’s a password. #1 :- what is the correct password? Answer :- hax0r   crackme2  Run the program ./crackme2.bin strings ./crackme2.bin   Let’s debug, r2 -d ./crackme2.bin There’s a main function. There’s com

Linux Fundamentals Part 3

 Tryhackme - Linux Fundamentals Part 3 #1 :-Edit "task3" located in "tryhackme"'s home directory using Nano. What is the flag? Answer :-THM{TEXT_EDITORS} #2 :-Download the file  http://MACHINE_IP:8000/.flag.txt  onto the TryHackMe AttackBox What are the contents? Answer :- THM{WGET_WEBSERVER} #3 :-If we were to launch a process where the previous ID was "300", what would the ID of this new process be? Answer :-301 #4 :-If we wanted to cleanly kill a process, what signal would we send it? Answer :-SIGTERM #5 :-Locate the process that is running on the deployed instance (MACHINE_IP). What flag is given? Answer :-THM{PROCESSES} #6 :-What command would we use to stop the service "myservice"? Answer :-systemctl stop myservice #7 :-What command would we use to start the same service on the boot-up of the system? Answer :-systemctl enable myservice #8 :-What command would we use to bring a previously backgrounded process back to the foreground? Answ

Linux Fundamentals Part 2

 Tryhackme - Linux Fundamentals Part 2   #1 :- What directional arrow key would we use to navigate down the manual page? Answer :-down #2 :- What flag would we use to display the output in a "human-readable" way? Answer :- -h  #3 :- How would you create the file named "newnote"? Answer :-touch newnote #4 :- On the deployable machine, what is the file type of "unknown1" in "tryhackme's" home directory?  Answer :-ASCII text #5 :- How would we move the file "myfile" to the directory "myfolder"   Answer :-mv myfile myfolder  #6 :- What are the contents of this file? Answer :-THM{FILESYSTEM}  #7 :- On the deployable machine, who is the owner of "important"?  Answer :-user2 #8 :- What would the command be to switch to the user "user2"?  Answer :-su user2 #9 :- Output the contents of &q

Linux Fundamentals Part 1

TryHackMe - Linux FundamentalsPart 1  #1 :- Research: What year was the first release of a Linux operating system?  Answer :-1991  #2 :- if we wanted to output the text "TryHackMe", what would our command be?  Answer :-echo TryHackMe  #3 :- What is the username of who you're logged in as on your deployed Linux machine? Answer :-tryhackme #4 :- On the Linux machine that you deploy, how many folders are there?    Answer :-2 #5 :- Which directory contains a file?  Answer :-folder4 #6 :- What is the contents of this file? Answer :-Hello World #7 :- Use the cd command to navigate to this file and find out the new current working directory. What is the path? An

Linux Server Forensics

 Tryhackme - Linux Server Forensics  first VM 10.10.197.91 Username - 'fred' Password - 'FredRules!'   #2 :- Navigate to /var/log/apache2?   fred@acmeweb:~$ cd /var/log/apache2   fred@acmeweb:/var/log/apache2$ ls   access.log  error.log  other_vhosts_access.log   fred@acmeweb:/var/log/apache2$ #3 :- How many different tools made requests to the server?   Answer :- 2 #4 :- Name a path requested by Nmap?    fred@acmeweb:/var/log/apache2$ cat access.log | grep nmap | cut -d '"' -f 2 | sort | uniq   GET /evox/about HTTP/1.1 GET /favicon.ico HTTP/1.1 GET /.git/HEAD HTTP/1.1 GET /HNAP1 HTTP/1.1 GET / HTTP/1.1 GET /nmaplowercheck1618912425 HTTP/1.1 GET /robots.txt HTTP/1.1 IDRT / HTTP/1.1 OPTIONS / HTTP/1.1 POST / HTTP/1.1 POST /sdk HTTP/1.1 PROPFIND / HTTP/1.1   Answer :- /nmaplowercheck1618912425  Web Server Analysis   #5 :- What page allows