DFIR Blog
  • Infosec
    • Blog
    • Threat Landscape
  • Digital Forensics
    • Windows Forensics
    • Mac Forensics
    • Memory Forensics
    • Forensic Resources
  • Incident Response
  • CISSP
    • Domain-1
    • Domain-2
    • Domain-3
    • Domain-4
    • Domain-5
    • Domain-6
    • Domain-7
    • Domain-8
  • Contact
  • HTB
  • Productivity

Bookmarks

2/12/2022

0 Comments

 
Spawning a TTY: ​https://netsec.ws/?p=337

Privilege Escalation
​https://github.com/rebootuser/LinEnum/blob/master/LinEnum.sh
0 Comments

Directory Enumeration

2/9/2022

0 Comments

 
gobuster dir -u <IP Address> -w <Wordlist> -e -s "200,301,302,401" -t 100
0 Comments

Privilege Escalation Methods

2/9/2022

0 Comments

 
Python 3.8

​import os

os.setuid(0)
os.system("/bin/bash")
0 Comments

Passive Reconnaissance

1/9/2022

0 Comments

 
“If you know the enemy and know yourself, your victory will not stand in doubt.”
- Art of War, Sun Tzu taught. Threat Intelligence is the key for Blue Team while Reconnaissance is the key for the success of the Red Team.

Tools for getting the publicly available information of the Target. This will not trigger/alert the target.
Common tools:
- whois
- nslookup

#whois: Most of the Unix/Linux will have the whois client by default. whois search will give you information about the registrar, nameservers etc. 

commmand: whois <domainname>

#nslookup
command: nslookup -type=<> <domainname> 1.1.1.1

Type
a or A - ipv4
aaaa or AAAA -ipv6
mx or MX for mailserver
txt or TXT for txt file 

server
1.1.1.1 - cloudflare
8.8.8.8 - google
​

0 Comments

Network mapper (nmap)

1/9/2022

0 Comments

 
Nmap is an amazing tools used by Red and Blue teamer for offensive and defensive purposes.To run the Nmap command you'll need a target machine or a list of target machines. 


  • nmap -iL list_of_hosts.txt.


​
- Used at the recon stage.
- ​Most command command is nmap -sV -sC <target ip-address>
* this command is too noisy. 
  • nmap -Pn <target ip-address>
  • ​nmap -sV -sC -p 22,80 -T4 10.129.189.116

Script:
​
ports=$(nmap -p- --min-rate=1000 -Pn -T4 <IP ADDRESS> | grep '^[0-9]' | cut -d '/' -f 1| tr '\n' ',' | sed s/,$//)
nmap -p$ports-Pn-sC-sV <IP ADDRESS>
0 Comments

    Author

    Write something about yourself. No need to be fancy, just an overview.

    Archives

    February 2022
    January 2022

    Categories

    All

    RSS Feed

  • Infosec
    • Blog
    • Threat Landscape
  • Digital Forensics
    • Windows Forensics
    • Mac Forensics
    • Memory Forensics
    • Forensic Resources
  • Incident Response
  • CISSP
    • Domain-1
    • Domain-2
    • Domain-3
    • Domain-4
    • Domain-5
    • Domain-6
    • Domain-7
    • Domain-8
  • Contact
  • HTB
  • Productivity