<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Chief Dennis' Blog</title><link>https://chiefdennis.github.io/</link><description>Recent content on Chief Dennis' Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Thu, 11 Dec 2025 13:07:16 +0100</lastBuildDate><atom:link href="https://chiefdennis.github.io/index.xml" rel="self" type="application/rss+xml"/><item><title>Sorcerer Offsec Walkthrough</title><link>https://chiefdennis.github.io/posts/offsec_sorcerer/</link><pubDate>Thu, 11 Dec 2025 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/offsec_sorcerer/</guid><description>&lt;h2 id="sorcerer-offsec-walkthrough">
 Sorcerer OffSec Walkthrough
 &lt;a class="heading-link" href="#sorcerer-offsec-walkthrough">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>&lt;img src="https://chiefdennis.github.io/posts/offsec_sorcerer/Picture_0.png" alt="image">&lt;/p>
&lt;h3 id="1-introduction">
 1. Introduction
 &lt;a class="heading-link" href="#1-introduction">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h3>
&lt;p>This walkthrough documents the compromise of the Sorcerer machine from CyberSecLabs (CFT).&lt;/p>
&lt;p>We compromised the Sorcerer machine through classic multi-surface enumeration: multiple web servers, exposed ZIP archives leaking Tomcat credentials and SSH keys, restricted SSH bypass through editing authorized_keys, and final privilege escalation via a misconfigured SUID start-stop-daemon binary (GTFOBins).&lt;/p></description></item><item><title>Payday Offsec Walkthrough</title><link>https://chiefdennis.github.io/posts/payday-walkthrough/</link><pubDate>Sat, 29 Nov 2025 19:00:00 +0100</pubDate><guid>https://chiefdennis.github.io/posts/payday-walkthrough/</guid><description>&lt;h2 id="payday-offsec-walkthrough">
 Payday OffSec Walkthrough
 &lt;a class="heading-link" href="#payday-offsec-walkthrough">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>&lt;img src="https://chiefdennis.github.io/posts/payday-walkthrough/Picture_0.png" alt="image">&lt;/p>
&lt;p>This walkthrough documents the full compromise of the OffSec “Payday” target machine.
The attack path involves classic recon, discovery of an outdated CS-Cart e-commerce panel, authenticated file upload leading to RCE, and finally a privilege escalation via weak local user credentials and unrestricted sudo access.
Despite a large attack surface (SMTP/IMAP/SSLv2/Samba 3.x/etc.), the intended path is surprisingly simple—but easy to overlook.&lt;/p></description></item><item><title>Pelican Offsec Walkthrough</title><link>https://chiefdennis.github.io/posts/pelican-walkthrough/</link><pubDate>Sat, 29 Nov 2025 11:00:00 +0100</pubDate><guid>https://chiefdennis.github.io/posts/pelican-walkthrough/</guid><description>&lt;h2 id="pelican-offsec-walkthrough">
 Pelican OffSec Walkthrough
 &lt;a class="heading-link" href="#pelican-offsec-walkthrough">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>&lt;img src="https://chiefdennis.github.io/posts/pelican-walkthrough/Picture_0.png" alt="image">&lt;/p>
&lt;p>This walkthrough covers the full exploitation path for the Pelican target, from initial reconnaissance to root compromise and post-exploitation considerations. We focus on service enumeration, misconfigurations, abusing an exposed Exhibitor instance, credential extraction through memory dumping, and privilege escalation.&lt;/p>
&lt;h3 id="1-reconnaissance">
 1. Reconnaissance
 &lt;a class="heading-link" href="#1-reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h3>
&lt;p>First, a ping is made to verify connection with the machine:&lt;/p></description></item><item><title>ClamAV Offsec Walkthrough</title><link>https://chiefdennis.github.io/posts/clamav-walkthrough/</link><pubDate>Fri, 29 Aug 2025 18:00:00 +0100</pubDate><guid>https://chiefdennis.github.io/posts/clamav-walkthrough/</guid><description>&lt;h2 id="clamav-offsec-walkthrough">
 ClamAV OffSec Walkthrough
 &lt;a class="heading-link" href="#clamav-offsec-walkthrough">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;h3 id="1-reconnaissance">
 1. Reconnaissance
 &lt;a class="heading-link" href="#1-reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h3>
&lt;p>First, a ping is made to verify connection with the machine:&lt;/p>
&lt;p>&lt;img src="https://chiefdennis.github.io/posts/clamav-walkthrough/Picture.png" alt="image">&lt;/p>
&lt;p>A high TTL of ~130 is observed. However, the later Nmap scan will show a TTL of 61, which is more typical for Linux machines.&lt;/p>
&lt;p>A nmap SYN scan is run to discover all open ports:&lt;/p>
&lt;p>sudo nmap -sS -T5 -vvv -p- 192.168.199.42 -Pn -oG nmap_inicial&lt;/p></description></item><item><title>Internal Offsec Walkthrough</title><link>https://chiefdennis.github.io/posts/offsec_internal/</link><pubDate>Mon, 09 Jun 2025 15:43:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/offsec_internal/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/offsec_internal/image1.png#center" alt="">&lt;/p>
&lt;hr>
&lt;h2 id="introduction">
 Introduction
 &lt;a class="heading-link" href="#introduction">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>This post analyzes the process of privilege analysis, exploitation, and escalation in a vulnerable Windows environment. To do this, a network scan is carried out using Nmap, identifying open ports and services on the target system. Subsequently, using Metasploit, the presence of vulnerabilities in the SMB service is searched for and verified.&lt;/p>
&lt;p>In particular, the system is found to be vulnerable to CVE-2009-3103, a security flaw in SMB 2.0.2 that allows remote execution of code with elevated privileges. By exploiting this vulnerability, access is gained to the victim machine with NT AUTHORITY\SYSTEM privileges, granting full control over the system.&lt;/p></description></item><item><title> WPA/WPA2 Protocol: Packet format analysis and attacks against it</title><link>https://chiefdennis.github.io/projects/wpa_protocol_attacks/</link><pubDate>Sun, 01 Jun 2025 15:43:16 +0100</pubDate><guid>https://chiefdennis.github.io/projects/wpa_protocol_attacks/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/projects/wpa_protocol_attacks/image1.png" alt="">&lt;/p>
&lt;h2 id="identification-of-the-different-types-of-wpa-protocol-packets">
 Identification of the different types of WPA protocol packets.
 &lt;a class="heading-link" href="#identification-of-the-different-types-of-wpa-protocol-packets">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>In this first phase, the analysis of a traffic capture corresponding to a WiFi network with WPA2-PSK authentication has been carried out. The tool used has been Wireshark, due to its ability to interpret and decompose network protocols in a detailed way. The purpose of this point is to identify the different types of packets involved in the WPA2 connection and authentication process, as well as to examine the most relevant fields of each and understand their function within the overall context of the capture.&lt;/p></description></item><item><title>Operational installation of a VPN with OpenVPN</title><link>https://chiefdennis.github.io/projects/operational_installation_openvpn/</link><pubDate>Tue, 20 May 2025 15:43:16 +0100</pubDate><guid>https://chiefdennis.github.io/projects/operational_installation_openvpn/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/projects/operational_installation_openvpn/image1.png" alt="">&lt;/p>
&lt;h2 id="introduction">
 Introduction
 &lt;a class="heading-link" href="#introduction">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>Currently, Virtual Private Networks (VPNs) are a widely used solution to establish secure communication channels over public or shared networks. Its main objective is to offer confidentiality, authentication and integrity in the transmission of data between different devices, simulating a private local network by encrypting the information that circulates through the network.&lt;/p>
&lt;p>In this practice, a VPN has been implemented using OpenVPN, an open-source toolthat allows you to create encrypted tunnels based on the SSL/TLS protocol. The work environment is composed of three Kali Linux virtual machines:&lt;/p></description></item><item><title>Cockpit Offsec Walkthrough</title><link>https://chiefdennis.github.io/posts/offsec_cockpit/</link><pubDate>Sun, 18 May 2025 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/offsec_cockpit/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/offsec_cockpit/image0.png" alt="image">&lt;/p>
&lt;h2 id="introduction">
 Introduction
 &lt;a class="heading-link" href="#introduction">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;h3 id="sql-injection-vulnerability">
 SQL injection vulnerability
 &lt;a class="heading-link" href="#sql-injection-vulnerability">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h3>
&lt;p>A SQL Injection (SQLi) vulnerability is one of the most critical threatsin web applications that interact with databases. This vulnerability occurs when an application does not properly validate and sanitize user input before using it in SQL queries, allowing an attacker to manipulate these queries to access, modify, or delete data in the database.&lt;/p></description></item><item><title>WifiChallenge Lab CTF</title><link>https://chiefdennis.github.io/projects/wifi_challenge_lab/</link><pubDate>Thu, 15 May 2025 15:43:16 +0100</pubDate><guid>https://chiefdennis.github.io/projects/wifi_challenge_lab/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/projects/wifi_challenge_lab/image1.png" alt="">&lt;/p>
&lt;h2 id="introduction">
 Introduction
 &lt;a class="heading-link" href="#introduction">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>This write-up summarizes the completion of the WiFiChallenge Lab, a practical cybersecurity exercise focused on wireless network security. Throughout the lab, various Wi-Fi attack techniques were explored and executed, including packet capture, handshake extraction, password cracking, and exploiting common vulnerabilities in WEP and WPA/WPA2 networks. The objective was to simulate real-world scenarios, enhance practical skills in wireless penetration testing, and deepen understanding of Wi-Fi security protocols and their weaknesses. This walkthrough outlines the methodology, tools used, challenges encountered, and key takeaways from the experience.&lt;/p></description></item><item><title>DVR4 Offsec Walkthrough</title><link>https://chiefdennis.github.io/posts/offsec_dvr4/</link><pubDate>Tue, 01 Apr 2025 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/offsec_dvr4/</guid><description>&lt;h2 id="dvr4-offsec-walkthrough">
 DVR4 Offsec Walkthrough
 &lt;a class="heading-link" href="#dvr4-offsec-walkthrough">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>&lt;img src="https://chiefdennis.github.io/posts/offsec_dvr4/Picture23.png" alt="image">&lt;/p>
&lt;h3 id="lfi-vulnerability">
 LFI Vulnerability
 &lt;a class="heading-link" href="#lfi-vulnerability">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h3>
&lt;p>Local File Inclusion (LFI) is a security vulnerability in web applications that allows an attacker to access files stored on the server. This failure occurs when an applicationconstructs file paths based on user input without properly validating its contents. As a result, an attacker can manipulate those paths to read sensitive system files and, in some cases, execute malicious code.&lt;/p></description></item><item><title>Snookum Offsec Walkthrough</title><link>https://chiefdennis.github.io/posts/offsec_snookum/</link><pubDate>Sun, 16 Mar 2025 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/offsec_snookum/</guid><description>&lt;h2 id="snookum-offsec-walkthrough">
 Snookum OffSec Walkthrough
 &lt;a class="heading-link" href="#snookum-offsec-walkthrough">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;h3 id="rfi-vulnerability">
 RFI Vulnerability
 &lt;a class="heading-link" href="#rfi-vulnerability">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h3>
&lt;p>Remote File Inclusion (RFI) is a vulnerability in web applications that allows an attacker to upload and execute files hosted on external servers. This flaw occurs when an applicationdynamically includes files without properly validating user input, which can lead to the execution of malicious code. If proper security measures are not taken, RFI can completely compromise a system, facilitating data theft, malware execution, or even full control of the server.&lt;/p></description></item><item><title>Reconnaissance of Vulnerable Software with Nessus and OpenVAS</title><link>https://chiefdennis.github.io/projects/reconnaisance_vulnerabilities_nessus_openvas/</link><pubDate>Sun, 23 Feb 2025 15:43:16 +0100</pubDate><guid>https://chiefdennis.github.io/projects/reconnaisance_vulnerabilities_nessus_openvas/</guid><description>&lt;p>&lt;strong>&lt;img src="#ZgotmplZ" alt="">&lt;/strong>&lt;/p>
&lt;p>&lt;a href="#introduction" >1. Introduction&lt;/a>&lt;/p>
&lt;p>&lt;a href="#analysis-tools" >2. Analysis Tools&lt;/a>&lt;/p>
&lt;p>&lt;a href="#scan-settings" >3. Scan Settings&lt;/a>&lt;/p>
&lt;p>&lt;a href="#nessus-scanning-parameters" >3.1. Nessus Scanning Parameters&lt;/a>&lt;/p>
&lt;p>&lt;a href="#openvas-scanning-parameters" >3.2. OpenVAS Scanning Parameters&lt;/a>&lt;/p>
&lt;p>&lt;a href="#analysis-process" >4. Analysis Process&lt;/a>&lt;/p>
&lt;p>&lt;a href="#running-the-scan-with-nessus" >4.1. Running the Scan with Nessus&lt;/a>&lt;/p>
&lt;p>&lt;a href="#running-the-scan-with-openvas" >4.2. Running the Scan with OpenVAS&lt;/a>&lt;/p>
&lt;p>&lt;a href="#comparison-of-results" >5. Comparison of Results&lt;/a>&lt;/p>
&lt;p>&lt;a href="#conclusions" >6. Conclusions&lt;/a>&lt;/p>
&lt;h2 id="introduction">
 Introduction
 &lt;a class="heading-link" href="#introduction">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>The purpose of this report is to examine the security of a system through specialized tools for detecting vulnerabilities. To do this, exhaustive scans have been carried out using Nessus and OpenVAS on the &lt;a href="https://github.com/rapid7/metasploitable3" class="external-link" target="_blank" rel="noopener">Metasploitable3 virtual machine (Linux)&lt;/a>. After data collection, the findings will be analyzed and a detailed comparison of both tools will be made.&lt;/p></description></item><item><title>ARP and DNS spoofing with Bettercap</title><link>https://chiefdennis.github.io/projects/arp_and_dns_spoofing_bettercap/</link><pubDate>Sun, 09 Feb 2025 15:43:16 +0100</pubDate><guid>https://chiefdennis.github.io/projects/arp_and_dns_spoofing_bettercap/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/projects/arp_and_dns_spoofing_bettercap/Picture0.png" alt="">&lt;/p>
&lt;p>&lt;a href="#introduction" >1. Introduction&lt;/a>&lt;/p>
&lt;p>&lt;a href="#arp-spoofing-attack" >2. Attack Execution&lt;/a>&lt;/p>
&lt;p>&lt;a href="#arp-spoofing-attack" >2.1. ARP Poisoning&lt;/a>&lt;/p>
&lt;p>&lt;a href="#dns-spoofing-attack" >2.2. DNS Spoofing&lt;/a>&lt;/p>
&lt;p>&lt;a href="#fake-web-page-setup" >2.3. Fake Web Page Setup&lt;/a>&lt;/p>
&lt;p>&lt;a href="#credential-theft" >2.4. Credential Theft&lt;/a>&lt;/p>
&lt;p>&lt;a href="#stopping-the-attack" >3. Stopping the attack&lt;/a>&lt;/p>
&lt;p>&lt;a href="#conclusions" >4. Conclusions&lt;/a>&lt;/p>
&lt;h1 id="introduction">
 Introduction
 &lt;a class="heading-link" href="#introduction">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h1>
&lt;p>In the field of cybersecurity, analyzing vulnerabilities in local networks is a fundamental task for understanding potential threats and designing appropriate defense mechanisms. Among the most common attacks affecting the integrity and confidentiality of information in a network are ARP Spoofing and DNS Spoofing, techniques used to intercept, modify, and redirect traffic from devices connected to a LAN.&lt;/p></description></item><item><title>Steganographic techniques, analysis, and usage of S-Tools</title><link>https://chiefdennis.github.io/projects/steganography_and_s-tools/</link><pubDate>Wed, 01 Jan 2025 15:43:16 +0100</pubDate><guid>https://chiefdennis.github.io/projects/steganography_and_s-tools/</guid><description>&lt;h1 id="1--introduction">
 1.- Introduction
 &lt;a class="heading-link" href="#1--introduction">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h1>
&lt;p>This post is about steganographic tools and analysis techniques in search of hidden information. In this case, the S-Tools tool is used. We will also use a custom python script to help us analyze the images bit by bit in search for hidden information. Lastly, we will also perform a histogram analysis, coding another custom python script.&lt;/p>
&lt;p>S-Tools is a very powerful tool developed by Andy Brown. It allows you to hide messages using steganography in BMP, GIF, and WAV images. It is a very simple tool that allows drag-and-drop to process the relevant files. Additionally, it can encrypt the hidden information so that even if the message is discovered, the information cannot be decrypted without the password.&lt;/p></description></item><item><title>Blurry HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_blurry/</link><pubDate>Sun, 16 Jun 2024 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_blurry/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_blurry/Scr_6.png#center" alt="image">&lt;/p>
&lt;p>The Blurry HTB machine is a medium difficulty level HackTheBox Machine. The main techniques and tools used to crack this machine are:&lt;/p>
&lt;pre>&lt;code>- ClearML
- CVE-2024-24590
- Json deserialization
- Scipt analysis
- Fickling
- Python scripting
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>We start a broad Nmap scan by executing the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-sh" data-lang="sh">&lt;span class="line">&lt;span class="cl">sudo nmap -sS -T5 -vvv -p- 10.10.11.19 -Pn -oG nmap_inicial
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Where the arguments mean:&lt;/p></description></item><item><title>Runner HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_runner/</link><pubDate>Mon, 10 Jun 2024 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_runner/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_runner/Scr_29.png#center" alt="image">&lt;/p>
&lt;p>The Runner HTB machine is a medium difficulty level HackTheBox Machine. The main techniques and tools used to crack this machine are:&lt;/p>
&lt;pre>&lt;code>- Subdirectory discovery with ffuf
- CVE-2024-27198
- Hash cracking with JohnTheRipper
- Docker escape
- CVE-2024-21626
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>We start a broad Nmap scan by executing the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-sh" data-lang="sh">&lt;span class="line">&lt;span class="cl">sudo nmap -sS -T5 -vvv -p- 10.10.11.13 -Pn -oG nmap_inicial
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Where the arguments mean:&lt;/p></description></item><item><title>BoardLight HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_boardlight/</link><pubDate>Tue, 04 Jun 2024 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_boardlight/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_boardlight/Scr_25.png#centre" alt="image">&lt;/p>
&lt;p>The BoardLight HTB machine is a medium difficulty level HackTheBox Machine. The main techniques and tools used to crack this machine are:&lt;/p>
&lt;pre>&lt;code>- Grep / Find
- Subdomain discovery with ffuf
- CVE-2023-30253
- CVE-2022-37706
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>We start a broad Nmap scan by executing the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-sh" data-lang="sh">&lt;span class="line">&lt;span class="cl">sudo nmap -sS -T5 -vvv -p- 10.10.11.11 -Pn -oG nmap_inicial
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Where the arguments mean:&lt;/p></description></item><item><title>Usage HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_usage/</link><pubDate>Wed, 29 May 2024 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_usage/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_usage/Scr_20.png#centre" alt="image">&lt;/p>
&lt;p>The Usage HTB machine is a madium difficulty level HackTheBox Machine. The main techniques and tools used to crack this machine are:&lt;/p>
&lt;pre>&lt;code>- Blind SQL injection with SQLmap
- Burpsuite
- Hash cracking with JohnTheRipper
- 7z Wildcard Spare exploitation
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>We start a broad Nmap scan by executing the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-sh" data-lang="sh">&lt;span class="line">&lt;span class="cl">sudo nmap -sS -T5 -vvv -p- 10.10.11.18 -Pn -oG nmap_inicial
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Where the arguments mean:&lt;/p></description></item><item><title>Configure and deploy Azure Firewall Manager Part 3: Test the Firewall</title><link>https://chiefdennis.github.io/projects/configure_deploy_azure_fw_manager_3/</link><pubDate>Thu, 11 Apr 2024 08:43:16 +0100</pubDate><guid>https://chiefdennis.github.io/projects/configure_deploy_azure_fw_manager_3/</guid><description>&lt;p>For part 3 of the series, test the firewall in two steps. First, we’ll test the application rule; then, we’ll test the network rule. To test the firewall rules, we’ll connect a remote desktop using the firewall’s public IP address, which is NATed to Workload-1. From there, we’ll use a browser to test the application rule and connect a remote desktop to Workload-2 to test the network rule. It is important to remember, as with all testing, firewall testing is essential to maintaining a secure network and mustn’t be overlooked.&lt;/p></description></item><item><title>Configure and deploy Azure Firewall Manager Part 2: Deploy the servers</title><link>https://chiefdennis.github.io/projects/configure_deploy_azure_fw_manager_2/</link><pubDate>Sat, 09 Mar 2024 08:43:16 +0100</pubDate><guid>https://chiefdennis.github.io/projects/configure_deploy_azure_fw_manager_2/</guid><description>&lt;p>For part 2 of the series, we will deploy our workloads/servers. This process is similar as to any virtual machine deployment in the Azure Cloud.&lt;/p>
&lt;h3 id="deploy-the-servers">
 Deploy the servers
 &lt;a class="heading-link" href="#deploy-the-servers">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h3>
&lt;p>Deploying servers involves setting up and preparing a server to host and run applications or services. When discussing deploying servers in a cloud environment, this process often consists of creating and configuring virtual machines, setting up network connectivity and security, and installing and configuring software, all done within the cloud provider&amp;rsquo;s management interface or using infrastructure as code (IaC) tools such as Terraform.&lt;/p></description></item><item><title>Configure and deploy Azure Firewall Manager Part 1: Create a hub and spoke architecture</title><link>https://chiefdennis.github.io/projects/configure_deploy_azure_fw_manager_1/</link><pubDate>Mon, 26 Feb 2024 08:43:16 +0100</pubDate><guid>https://chiefdennis.github.io/projects/configure_deploy_azure_fw_manager_1/</guid><description>&lt;p>Azure Firewall Manager is a central network security policy and route management service for globally distributed, software-defined perimeters. It can provide security management for two network architecture types, the secured virtual hub and the hub virtual network.&lt;/p>
&lt;p>Using Azure Firewall Manager, you can create secured virtual hubs to secure your cloud network traffic destined to private IP addresses, Azure PaaS, and the Internet. Traffic routing to the firewall is automated, so there&amp;rsquo;s no need to create user-defined routes (UDRs).&lt;/p></description></item><item><title>Monitored HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_monitored/</link><pubDate>Sat, 17 Feb 2024 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_monitored/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_monitored/Screenshot_20.png" alt="image">&lt;/p>
&lt;p>The Monitored HTB machine is a medium difficulty level HackTheBox Machine. The main tools and techniques used to crack this machine are:&lt;/p>
&lt;pre>&lt;code> - Dirsearch
 - CVE-2023-40931
 - NMAP UDP scan
 - SNMP enumeration with SNMPwalk
 - JohnTheRipper
 - SQL injection with SQLmap
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>We start a broad Nmap TCP scan by executing the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-sh" data-lang="sh">&lt;span class="line">&lt;span class="cl">sudo nmap -sS -T5 -vvv -p- 10.10.11.248 -Pn -oG nmap_inicial
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Where the arguments mean:&lt;/p></description></item><item><title>Bizness HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_bizness/</link><pubDate>Fri, 02 Feb 2024 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_bizness/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_bizness/15.png#center" alt="image">&lt;/p>
&lt;p>The Bizness HTB machine is an easy difficulty level HackTheBox Machine. The main techniques and tools used to crack this machine are:&lt;/p>
&lt;pre>&lt;code> - Dirsearch
 - CVE-2023-51467
 - Grep, find and strings
 - Hashcat
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>We start a broad Nmap scan by executing the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-sh" data-lang="sh">&lt;span class="line">&lt;span class="cl">sudo nmap -sS -T5 -vvv -p- 10.10.11.252 -Pn -oG nmap_inicial
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Where the arguments mean:&lt;/p></description></item><item><title>About</title><link>https://chiefdennis.github.io/about/</link><pubDate>Sun, 28 Jan 2024 19:19:53 +0100</pubDate><guid>https://chiefdennis.github.io/about/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/about/avatar.png#center" alt="image">&lt;/p>
&lt;p>Hello! I’m Dennis, a cybersecurity engineer with a background in aerospace engineering and a passion for complex technical systems. My academic journey began with a Bachelor’s in Aerospace Engineering, where I developed strong analytical and problem-solving skills that continue to shape the way I approach technology and security.&lt;/p>
&lt;p>Over the years, I’ve worked in environments that blend telecommunications, IT security, and critical infrastructure. These roles have allowed me to gain hands-on experience with Linux systems, networking, cloud architectures, firewalls, IDS/IPS, automation, and secure system design. I’ve also been deeply involved in vulnerability management, patch orchestration, and the development of technical solutions that improve the reliability and security of large-scale operational systems.&lt;/p></description></item><item><title>Contact me!</title><link>https://chiefdennis.github.io/contact/</link><pubDate>Sun, 28 Jan 2024 19:19:53 +0100</pubDate><guid>https://chiefdennis.github.io/contact/</guid><description>&lt;p>Hey! You can contact me via my &lt;a href="https://www.linkedin.com/in/dennis-gabriel-drebitca-popovici-8731b4233/" class="external-link" target="_blank" rel="noopener">LinkedIn profile&lt;/a>.&lt;/p></description></item><item><title>TwoMillion HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_twomillion/</link><pubDate>Tue, 16 Jan 2024 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_twomillion/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_twomillion/Screenshot_20.png#centre" alt="image">&lt;/p>
&lt;p>The TwoMillion HTB machine is an easy difficulty level HackTheBox Machine. The main techniques and tools used to crack this machine are:&lt;/p>
&lt;pre>&lt;code>- Command Injection
- Burpsuite
- CVE-2023-0386
- JS deobfuscation with Cyberchef
- API enumeration
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>We start a broad Nmap scan by executing the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-sh" data-lang="sh">&lt;span class="line">&lt;span class="cl">sudo nmap -sS -T5 -vvv -p- 10.10.11.221 -Pn -oG nmap_inicial
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Where the arguments mean:&lt;/p></description></item><item><title>GPS NMEA TCP/IP stream to COM port via com0com and com2tcp</title><link>https://chiefdennis.github.io/projects/nmea_ip_to_google_earth/</link><pubDate>Fri, 29 Dec 2023 15:43:16 +0100</pubDate><guid>https://chiefdennis.github.io/projects/nmea_ip_to_google_earth/</guid><description>&lt;p>In this project we will explore how we can serve TCP/IP data coming in through an open port, and turn it into a virtual serial port or COM port.
In this case, I have a router that has an internal GPS that can serve the NMEA sentences to a given IP and port via TCP/IP. However, most programs that use GPS (like Google Earth) do it through a COM port. So, how can we &amp;rsquo;translate&amp;rsquo; the TCP/IP data into a serial COM stream?&lt;/p></description></item><item><title>Manage Entra ID users via Azure Portal</title><link>https://chiefdennis.github.io/projects/manage_entra_id_users/</link><pubDate>Sun, 03 Dec 2023 15:43:16 +0100</pubDate><guid>https://chiefdennis.github.io/projects/manage_entra_id_users/</guid><description>&lt;p>In this post we will learn how to create, edit and delete Microsoft Entra ID users. &lt;a href="https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-id" class="external-link" target="_blank" rel="noopener">Microsoft Entra ID&lt;/a> is an integrated cloud identity and access solution, and a leader in the market for managing directories, enabling access to applications, and protecting identities.&lt;/p>
&lt;p>&lt;img src="https://chiefdennis.github.io/projects/manage_entra_id_users/Entra_ID_Diagram.avif" alt="image">&lt;/p>
&lt;p>To create a user, first navigate to Microsoft Entra ID in the Azure Portal.&lt;/p>
&lt;p>&lt;img src="https://chiefdennis.github.io/projects/manage_entra_id_users/1.png" alt="image">&lt;/p>
&lt;p>Then click on Users.&lt;/p>
&lt;p>&lt;img src="https://chiefdennis.github.io/projects/manage_entra_id_users/2.png" alt="image">&lt;/p>
&lt;p>You will be seeing the Users page. On the left hand menu, we can see the following tabs:&lt;/p></description></item><item><title>Clicker HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_clicker/</link><pubDate>Mon, 27 Nov 2023 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_clicker/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_clicker/clicker.jpg" alt="image">&lt;/p>
&lt;p>The Clicker HTB machine is a medium difficulty level HackTheBox Machine. The main techniques used to crack this machine are:&lt;/p>
&lt;pre>&lt;code>- SQL Injection
- CRLF Injection
- Parameter Tampering
- PHP Reverse Shell
- Perl_startup Local Privilege Escalation
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>We start a broad Nmap scan by executing the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-sh" data-lang="sh">&lt;span class="line">&lt;span class="cl">sudo nmap -sS -T5 -vvv -p- 10.10.11.232 -Pn -oG nmap_inicial
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Where the arguments mean:&lt;/p></description></item><item><title>Codify HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_codify/</link><pubDate>Wed, 13 Sep 2023 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_codify/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_codify/codify.png" alt="image">&lt;/p>
&lt;p>The Codify HTB machine is a easy difficulty level HackTheBox Linux Machine. The main techniques used to crack this machine are:&lt;/p>
&lt;pre>&lt;code>- Hash cracking with JohnTheRipper
- Sandbox escape
- Batch Script Analysis
- Python Scripting
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>I started by running a NMAP scan to look for services and versions running on open ports;&lt;/p>
&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_codify/nmap.png" alt="image">&lt;/p>
&lt;p>We can see that the usual ports 22 and 80 are open. However, port 3000 is also open running node.js, which could be useful in the future since node.js has some known vulnerabilities in older versions.&lt;/p></description></item></channel></rss>