<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Posts on Chief Dennis' Blog</title><link>https://chiefdennis.github.io/posts/</link><description>Recent content in Posts on Chief Dennis' Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Thu, 11 Dec 2025 13:07:16 +0100</lastBuildDate><atom:link href="https://chiefdennis.github.io/posts/index.xml" rel="self" type="application/rss+xml"/><item><title>Sorcerer Offsec Walkthrough</title><link>https://chiefdennis.github.io/posts/offsec_sorcerer/</link><pubDate>Thu, 11 Dec 2025 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/offsec_sorcerer/</guid><description>&lt;h2 id="sorcerer-offsec-walkthrough">
 Sorcerer OffSec Walkthrough
 &lt;a class="heading-link" href="#sorcerer-offsec-walkthrough">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>&lt;img src="https://chiefdennis.github.io/posts/offsec_sorcerer/Picture_0.png" alt="image">&lt;/p>
&lt;h3 id="1-introduction">
 1. Introduction
 &lt;a class="heading-link" href="#1-introduction">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h3>
&lt;p>This walkthrough documents the compromise of the Sorcerer machine from CyberSecLabs (CFT).&lt;/p>
&lt;p>We compromised the Sorcerer machine through classic multi-surface enumeration: multiple web servers, exposed ZIP archives leaking Tomcat credentials and SSH keys, restricted SSH bypass through editing authorized_keys, and final privilege escalation via a misconfigured SUID start-stop-daemon binary (GTFOBins).&lt;/p></description></item><item><title>Payday Offsec Walkthrough</title><link>https://chiefdennis.github.io/posts/payday-walkthrough/</link><pubDate>Sat, 29 Nov 2025 19:00:00 +0100</pubDate><guid>https://chiefdennis.github.io/posts/payday-walkthrough/</guid><description>&lt;h2 id="payday-offsec-walkthrough">
 Payday OffSec Walkthrough
 &lt;a class="heading-link" href="#payday-offsec-walkthrough">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>&lt;img src="https://chiefdennis.github.io/posts/payday-walkthrough/Picture_0.png" alt="image">&lt;/p>
&lt;p>This walkthrough documents the full compromise of the OffSec “Payday” target machine.
The attack path involves classic recon, discovery of an outdated CS-Cart e-commerce panel, authenticated file upload leading to RCE, and finally a privilege escalation via weak local user credentials and unrestricted sudo access.
Despite a large attack surface (SMTP/IMAP/SSLv2/Samba 3.x/etc.), the intended path is surprisingly simple—but easy to overlook.&lt;/p></description></item><item><title>Pelican Offsec Walkthrough</title><link>https://chiefdennis.github.io/posts/pelican-walkthrough/</link><pubDate>Sat, 29 Nov 2025 11:00:00 +0100</pubDate><guid>https://chiefdennis.github.io/posts/pelican-walkthrough/</guid><description>&lt;h2 id="pelican-offsec-walkthrough">
 Pelican OffSec Walkthrough
 &lt;a class="heading-link" href="#pelican-offsec-walkthrough">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>&lt;img src="https://chiefdennis.github.io/posts/pelican-walkthrough/Picture_0.png" alt="image">&lt;/p>
&lt;p>This walkthrough covers the full exploitation path for the Pelican target, from initial reconnaissance to root compromise and post-exploitation considerations. We focus on service enumeration, misconfigurations, abusing an exposed Exhibitor instance, credential extraction through memory dumping, and privilege escalation.&lt;/p>
&lt;h3 id="1-reconnaissance">
 1. Reconnaissance
 &lt;a class="heading-link" href="#1-reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h3>
&lt;p>First, a ping is made to verify connection with the machine:&lt;/p></description></item><item><title>ClamAV Offsec Walkthrough</title><link>https://chiefdennis.github.io/posts/clamav-walkthrough/</link><pubDate>Fri, 29 Aug 2025 18:00:00 +0100</pubDate><guid>https://chiefdennis.github.io/posts/clamav-walkthrough/</guid><description>&lt;h2 id="clamav-offsec-walkthrough">
 ClamAV OffSec Walkthrough
 &lt;a class="heading-link" href="#clamav-offsec-walkthrough">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;h3 id="1-reconnaissance">
 1. Reconnaissance
 &lt;a class="heading-link" href="#1-reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h3>
&lt;p>First, a ping is made to verify connection with the machine:&lt;/p>
&lt;p>&lt;img src="https://chiefdennis.github.io/posts/clamav-walkthrough/Picture.png" alt="image">&lt;/p>
&lt;p>A high TTL of ~130 is observed. However, the later Nmap scan will show a TTL of 61, which is more typical for Linux machines.&lt;/p>
&lt;p>A nmap SYN scan is run to discover all open ports:&lt;/p>
&lt;p>sudo nmap -sS -T5 -vvv -p- 192.168.199.42 -Pn -oG nmap_inicial&lt;/p></description></item><item><title>Internal Offsec Walkthrough</title><link>https://chiefdennis.github.io/posts/offsec_internal/</link><pubDate>Mon, 09 Jun 2025 15:43:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/offsec_internal/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/offsec_internal/image1.png#center" alt="">&lt;/p>
&lt;hr>
&lt;h2 id="introduction">
 Introduction
 &lt;a class="heading-link" href="#introduction">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>This post analyzes the process of privilege analysis, exploitation, and escalation in a vulnerable Windows environment. To do this, a network scan is carried out using Nmap, identifying open ports and services on the target system. Subsequently, using Metasploit, the presence of vulnerabilities in the SMB service is searched for and verified.&lt;/p>
&lt;p>In particular, the system is found to be vulnerable to CVE-2009-3103, a security flaw in SMB 2.0.2 that allows remote execution of code with elevated privileges. By exploiting this vulnerability, access is gained to the victim machine with NT AUTHORITY\SYSTEM privileges, granting full control over the system.&lt;/p></description></item><item><title>Cockpit Offsec Walkthrough</title><link>https://chiefdennis.github.io/posts/offsec_cockpit/</link><pubDate>Sun, 18 May 2025 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/offsec_cockpit/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/offsec_cockpit/image0.png" alt="image">&lt;/p>
&lt;h2 id="introduction">
 Introduction
 &lt;a class="heading-link" href="#introduction">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;h3 id="sql-injection-vulnerability">
 SQL injection vulnerability
 &lt;a class="heading-link" href="#sql-injection-vulnerability">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h3>
&lt;p>A SQL Injection (SQLi) vulnerability is one of the most critical threatsin web applications that interact with databases. This vulnerability occurs when an application does not properly validate and sanitize user input before using it in SQL queries, allowing an attacker to manipulate these queries to access, modify, or delete data in the database.&lt;/p></description></item><item><title>DVR4 Offsec Walkthrough</title><link>https://chiefdennis.github.io/posts/offsec_dvr4/</link><pubDate>Tue, 01 Apr 2025 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/offsec_dvr4/</guid><description>&lt;h2 id="dvr4-offsec-walkthrough">
 DVR4 Offsec Walkthrough
 &lt;a class="heading-link" href="#dvr4-offsec-walkthrough">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>&lt;img src="https://chiefdennis.github.io/posts/offsec_dvr4/Picture23.png" alt="image">&lt;/p>
&lt;h3 id="lfi-vulnerability">
 LFI Vulnerability
 &lt;a class="heading-link" href="#lfi-vulnerability">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h3>
&lt;p>Local File Inclusion (LFI) is a security vulnerability in web applications that allows an attacker to access files stored on the server. This failure occurs when an applicationconstructs file paths based on user input without properly validating its contents. As a result, an attacker can manipulate those paths to read sensitive system files and, in some cases, execute malicious code.&lt;/p></description></item><item><title>Snookum Offsec Walkthrough</title><link>https://chiefdennis.github.io/posts/offsec_snookum/</link><pubDate>Sun, 16 Mar 2025 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/offsec_snookum/</guid><description>&lt;h2 id="snookum-offsec-walkthrough">
 Snookum OffSec Walkthrough
 &lt;a class="heading-link" href="#snookum-offsec-walkthrough">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;h3 id="rfi-vulnerability">
 RFI Vulnerability
 &lt;a class="heading-link" href="#rfi-vulnerability">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h3>
&lt;p>Remote File Inclusion (RFI) is a vulnerability in web applications that allows an attacker to upload and execute files hosted on external servers. This flaw occurs when an applicationdynamically includes files without properly validating user input, which can lead to the execution of malicious code. If proper security measures are not taken, RFI can completely compromise a system, facilitating data theft, malware execution, or even full control of the server.&lt;/p></description></item><item><title>Blurry HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_blurry/</link><pubDate>Sun, 16 Jun 2024 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_blurry/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_blurry/Scr_6.png#center" alt="image">&lt;/p>
&lt;p>The Blurry HTB machine is a medium difficulty level HackTheBox Machine. The main techniques and tools used to crack this machine are:&lt;/p>
&lt;pre>&lt;code>- ClearML
- CVE-2024-24590
- Json deserialization
- Scipt analysis
- Fickling
- Python scripting
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>We start a broad Nmap scan by executing the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-sh" data-lang="sh">&lt;span class="line">&lt;span class="cl">sudo nmap -sS -T5 -vvv -p- 10.10.11.19 -Pn -oG nmap_inicial
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Where the arguments mean:&lt;/p></description></item><item><title>Runner HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_runner/</link><pubDate>Mon, 10 Jun 2024 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_runner/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_runner/Scr_29.png#center" alt="image">&lt;/p>
&lt;p>The Runner HTB machine is a medium difficulty level HackTheBox Machine. The main techniques and tools used to crack this machine are:&lt;/p>
&lt;pre>&lt;code>- Subdirectory discovery with ffuf
- CVE-2024-27198
- Hash cracking with JohnTheRipper
- Docker escape
- CVE-2024-21626
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>We start a broad Nmap scan by executing the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-sh" data-lang="sh">&lt;span class="line">&lt;span class="cl">sudo nmap -sS -T5 -vvv -p- 10.10.11.13 -Pn -oG nmap_inicial
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Where the arguments mean:&lt;/p></description></item><item><title>BoardLight HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_boardlight/</link><pubDate>Tue, 04 Jun 2024 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_boardlight/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_boardlight/Scr_25.png#centre" alt="image">&lt;/p>
&lt;p>The BoardLight HTB machine is a medium difficulty level HackTheBox Machine. The main techniques and tools used to crack this machine are:&lt;/p>
&lt;pre>&lt;code>- Grep / Find
- Subdomain discovery with ffuf
- CVE-2023-30253
- CVE-2022-37706
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>We start a broad Nmap scan by executing the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-sh" data-lang="sh">&lt;span class="line">&lt;span class="cl">sudo nmap -sS -T5 -vvv -p- 10.10.11.11 -Pn -oG nmap_inicial
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Where the arguments mean:&lt;/p></description></item><item><title>Usage HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_usage/</link><pubDate>Wed, 29 May 2024 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_usage/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_usage/Scr_20.png#centre" alt="image">&lt;/p>
&lt;p>The Usage HTB machine is a madium difficulty level HackTheBox Machine. The main techniques and tools used to crack this machine are:&lt;/p>
&lt;pre>&lt;code>- Blind SQL injection with SQLmap
- Burpsuite
- Hash cracking with JohnTheRipper
- 7z Wildcard Spare exploitation
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>We start a broad Nmap scan by executing the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-sh" data-lang="sh">&lt;span class="line">&lt;span class="cl">sudo nmap -sS -T5 -vvv -p- 10.10.11.18 -Pn -oG nmap_inicial
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Where the arguments mean:&lt;/p></description></item><item><title>Monitored HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_monitored/</link><pubDate>Sat, 17 Feb 2024 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_monitored/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_monitored/Screenshot_20.png" alt="image">&lt;/p>
&lt;p>The Monitored HTB machine is a medium difficulty level HackTheBox Machine. The main tools and techniques used to crack this machine are:&lt;/p>
&lt;pre>&lt;code> - Dirsearch
 - CVE-2023-40931
 - NMAP UDP scan
 - SNMP enumeration with SNMPwalk
 - JohnTheRipper
 - SQL injection with SQLmap
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>We start a broad Nmap TCP scan by executing the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-sh" data-lang="sh">&lt;span class="line">&lt;span class="cl">sudo nmap -sS -T5 -vvv -p- 10.10.11.248 -Pn -oG nmap_inicial
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Where the arguments mean:&lt;/p></description></item><item><title>Bizness HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_bizness/</link><pubDate>Fri, 02 Feb 2024 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_bizness/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_bizness/15.png#center" alt="image">&lt;/p>
&lt;p>The Bizness HTB machine is an easy difficulty level HackTheBox Machine. The main techniques and tools used to crack this machine are:&lt;/p>
&lt;pre>&lt;code> - Dirsearch
 - CVE-2023-51467
 - Grep, find and strings
 - Hashcat
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>We start a broad Nmap scan by executing the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-sh" data-lang="sh">&lt;span class="line">&lt;span class="cl">sudo nmap -sS -T5 -vvv -p- 10.10.11.252 -Pn -oG nmap_inicial
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Where the arguments mean:&lt;/p></description></item><item><title>TwoMillion HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_twomillion/</link><pubDate>Tue, 16 Jan 2024 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_twomillion/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_twomillion/Screenshot_20.png#centre" alt="image">&lt;/p>
&lt;p>The TwoMillion HTB machine is an easy difficulty level HackTheBox Machine. The main techniques and tools used to crack this machine are:&lt;/p>
&lt;pre>&lt;code>- Command Injection
- Burpsuite
- CVE-2023-0386
- JS deobfuscation with Cyberchef
- API enumeration
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>We start a broad Nmap scan by executing the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-sh" data-lang="sh">&lt;span class="line">&lt;span class="cl">sudo nmap -sS -T5 -vvv -p- 10.10.11.221 -Pn -oG nmap_inicial
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Where the arguments mean:&lt;/p></description></item><item><title>Clicker HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_clicker/</link><pubDate>Mon, 27 Nov 2023 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_clicker/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_clicker/clicker.jpg" alt="image">&lt;/p>
&lt;p>The Clicker HTB machine is a medium difficulty level HackTheBox Machine. The main techniques used to crack this machine are:&lt;/p>
&lt;pre>&lt;code>- SQL Injection
- CRLF Injection
- Parameter Tampering
- PHP Reverse Shell
- Perl_startup Local Privilege Escalation
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>We start a broad Nmap scan by executing the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-sh" data-lang="sh">&lt;span class="line">&lt;span class="cl">sudo nmap -sS -T5 -vvv -p- 10.10.11.232 -Pn -oG nmap_inicial
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Where the arguments mean:&lt;/p></description></item><item><title>Codify HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_codify/</link><pubDate>Wed, 13 Sep 2023 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_codify/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_codify/codify.png" alt="image">&lt;/p>
&lt;p>The Codify HTB machine is a easy difficulty level HackTheBox Linux Machine. The main techniques used to crack this machine are:&lt;/p>
&lt;pre>&lt;code>- Hash cracking with JohnTheRipper
- Sandbox escape
- Batch Script Analysis
- Python Scripting
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>I started by running a NMAP scan to look for services and versions running on open ports;&lt;/p>
&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_codify/nmap.png" alt="image">&lt;/p>
&lt;p>We can see that the usual ports 22 and 80 are open. However, port 3000 is also open running node.js, which could be useful in the future since node.js has some known vulnerabilities in older versions.&lt;/p></description></item></channel></rss>