<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>CyberChef on Chief Dennis' Blog</title><link>https://chiefdennis.github.io/tags/cyberchef/</link><description>Recent content in CyberChef on Chief Dennis' Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Fri, 29 Aug 2025 18:00:00 +0100</lastBuildDate><atom:link href="https://chiefdennis.github.io/tags/cyberchef/index.xml" rel="self" type="application/rss+xml"/><item><title>ClamAV Offsec Walkthrough</title><link>https://chiefdennis.github.io/posts/clamav-walkthrough/</link><pubDate>Fri, 29 Aug 2025 18:00:00 +0100</pubDate><guid>https://chiefdennis.github.io/posts/clamav-walkthrough/</guid><description>&lt;h2 id="clamav-offsec-walkthrough">
 ClamAV OffSec Walkthrough
 &lt;a class="heading-link" href="#clamav-offsec-walkthrough">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;h3 id="1-reconnaissance">
 1. Reconnaissance
 &lt;a class="heading-link" href="#1-reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h3>
&lt;p>First, a ping is made to verify connection with the machine:&lt;/p>
&lt;p>&lt;img src="https://chiefdennis.github.io/posts/clamav-walkthrough/Picture.png" alt="image">&lt;/p>
&lt;p>A high TTL of ~130 is observed. However, the later Nmap scan will show a TTL of 61, which is more typical for Linux machines.&lt;/p>
&lt;p>A nmap SYN scan is run to discover all open ports:&lt;/p>
&lt;p>sudo nmap -sS -T5 -vvv -p- 192.168.199.42 -Pn -oG nmap_inicial&lt;/p></description></item><item><title>Snookum Offsec Walkthrough</title><link>https://chiefdennis.github.io/posts/offsec_snookum/</link><pubDate>Sun, 16 Mar 2025 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/offsec_snookum/</guid><description>&lt;h2 id="snookum-offsec-walkthrough">
 Snookum OffSec Walkthrough
 &lt;a class="heading-link" href="#snookum-offsec-walkthrough">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;h3 id="rfi-vulnerability">
 RFI Vulnerability
 &lt;a class="heading-link" href="#rfi-vulnerability">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h3>
&lt;p>Remote File Inclusion (RFI) is a vulnerability in web applications that allows an attacker to upload and execute files hosted on external servers. This flaw occurs when an applicationdynamically includes files without properly validating user input, which can lead to the execution of malicious code. If proper security measures are not taken, RFI can completely compromise a system, facilitating data theft, malware execution, or even full control of the server.&lt;/p></description></item><item><title>TwoMillion HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_twomillion/</link><pubDate>Tue, 16 Jan 2024 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_twomillion/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_twomillion/Screenshot_20.png#centre" alt="image">&lt;/p>
&lt;p>The TwoMillion HTB machine is an easy difficulty level HackTheBox Machine. The main techniques and tools used to crack this machine are:&lt;/p>
&lt;pre>&lt;code>- Command Injection
- Burpsuite
- CVE-2023-0386
- JS deobfuscation with Cyberchef
- API enumeration
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>We start a broad Nmap scan by executing the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-sh" data-lang="sh">&lt;span class="line">&lt;span class="cl">sudo nmap -sS -T5 -vvv -p- 10.10.11.221 -Pn -oG nmap_inicial
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Where the arguments mean:&lt;/p></description></item></channel></rss>