<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hash Cracking on Chief Dennis' Blog</title><link>https://chiefdennis.github.io/tags/hash-cracking/</link><description>Recent content in Hash Cracking on Chief Dennis' Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Wed, 29 May 2024 13:07:16 +0100</lastBuildDate><atom:link href="https://chiefdennis.github.io/tags/hash-cracking/index.xml" rel="self" type="application/rss+xml"/><item><title>Usage HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_usage/</link><pubDate>Wed, 29 May 2024 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_usage/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_usage/Scr_20.png#centre" alt="image">&lt;/p>
&lt;p>The Usage HTB machine is a madium difficulty level HackTheBox Machine. The main techniques and tools used to crack this machine are:&lt;/p>
&lt;pre>&lt;code>- Blind SQL injection with SQLmap
- Burpsuite
- Hash cracking with JohnTheRipper
- 7z Wildcard Spare exploitation
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>We start a broad Nmap scan by executing the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-sh" data-lang="sh">&lt;span class="line">&lt;span class="cl">sudo nmap -sS -T5 -vvv -p- 10.10.11.18 -Pn -oG nmap_inicial
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Where the arguments mean:&lt;/p></description></item><item><title>Bizness HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_bizness/</link><pubDate>Fri, 02 Feb 2024 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_bizness/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_bizness/15.png#center" alt="image">&lt;/p>
&lt;p>The Bizness HTB machine is an easy difficulty level HackTheBox Machine. The main techniques and tools used to crack this machine are:&lt;/p>
&lt;pre>&lt;code> - Dirsearch
 - CVE-2023-51467
 - Grep, find and strings
 - Hashcat
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>We start a broad Nmap scan by executing the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-sh" data-lang="sh">&lt;span class="line">&lt;span class="cl">sudo nmap -sS -T5 -vvv -p- 10.10.11.252 -Pn -oG nmap_inicial
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Where the arguments mean:&lt;/p></description></item><item><title>Codify HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_codify/</link><pubDate>Wed, 13 Sep 2023 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_codify/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_codify/codify.png" alt="image">&lt;/p>
&lt;p>The Codify HTB machine is a easy difficulty level HackTheBox Linux Machine. The main techniques used to crack this machine are:&lt;/p>
&lt;pre>&lt;code>- Hash cracking with JohnTheRipper
- Sandbox escape
- Batch Script Analysis
- Python Scripting
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>I started by running a NMAP scan to look for services and versions running on open ports;&lt;/p>
&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_codify/nmap.png" alt="image">&lt;/p>
&lt;p>We can see that the usual ports 22 and 80 are open. However, port 3000 is also open running node.js, which could be useful in the future since node.js has some known vulnerabilities in older versions.&lt;/p></description></item></channel></rss>