Skip to main content

2 posts tagged with "SSH"

SSH (Secure Shell) is a cryptographic network protocol that enables secure communication over an insecure channel. It allows users to remotely access and manage Unix-like systems, execute commands, transfer files, and tunnel other network protocols securely. SSH uses public-key cryptography to authenticate the user and encrypt all data transmitted between the client and server, providing strong security against eavesdropping, tampering, and man-in-the-middle attacks.

View All Tags

THM | Password Attacks

· 27 min read

Red Teaming | Password Attacks | Summary:

This room is designed to teach about various strategies and techniques used in cracking or guessing passwords. It covers both offline and online methods, including dictionary and brute-force attacks, rule-based attacks, and custom rules.

The room emphasizes password profiling, teaching users how to create effective wordlists using default, weak, leaked, combined, and username sources.

Other topics include keyspace techniques, CUPP (Custom Password Profile), and online attacks targeting FTP, SMTP, SSH, and HTTP login pages. Additionally, it introduces the concept of password spraying attacks.

HTB | Markup | Write-Up

· 15 min read

Summary:

We test connectivity to the target and scan it, then enumerate its website and login with some default credentials. Once we have user access, we continue enumerating the site. Analyzing the page source code reveals the used XML version and a potential username.

We exploit the found XXE vulnerability to leak the user's private SSH key, allowing us to access the target machine via SSH and gain user-level access. Next, we grab the user flag. With our foothold established, we enumerate the machine with user-level access until we find a job.bat file that runs with administrator privileges. We exploit this by modifying the scheduled job to run our reverse shell, wait for it to execute, and catch the connection to gain administrative access to the target machine. Finally, we grab the root flag.

Machine Name: Markup | Difficulty: Easy | OS: Windows