<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>JohnTheRipper on Chief Dennis' Blog</title><link>https://chiefdennis.github.io/tags/johntheripper/</link><description>Recent content in JohnTheRipper on Chief Dennis' Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Mon, 10 Jun 2024 13:07:16 +0100</lastBuildDate><atom:link href="https://chiefdennis.github.io/tags/johntheripper/index.xml" rel="self" type="application/rss+xml"/><item><title>Runner HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_runner/</link><pubDate>Mon, 10 Jun 2024 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_runner/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_runner/Scr_29.png#center" alt="image">&lt;/p>
&lt;p>The Runner HTB machine is a medium difficulty level HackTheBox Machine. The main techniques and tools used to crack this machine are:&lt;/p>
&lt;pre>&lt;code>- Subdirectory discovery with ffuf
- CVE-2024-27198
- Hash cracking with JohnTheRipper
- Docker escape
- CVE-2024-21626
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>We start a broad Nmap scan by executing the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-sh" data-lang="sh">&lt;span class="line">&lt;span class="cl">sudo nmap -sS -T5 -vvv -p- 10.10.11.13 -Pn -oG nmap_inicial
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Where the arguments mean:&lt;/p></description></item><item><title>Usage HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_usage/</link><pubDate>Wed, 29 May 2024 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_usage/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_usage/Scr_20.png#centre" alt="image">&lt;/p>
&lt;p>The Usage HTB machine is a madium difficulty level HackTheBox Machine. The main techniques and tools used to crack this machine are:&lt;/p>
&lt;pre>&lt;code>- Blind SQL injection with SQLmap
- Burpsuite
- Hash cracking with JohnTheRipper
- 7z Wildcard Spare exploitation
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>We start a broad Nmap scan by executing the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-sh" data-lang="sh">&lt;span class="line">&lt;span class="cl">sudo nmap -sS -T5 -vvv -p- 10.10.11.18 -Pn -oG nmap_inicial
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Where the arguments mean:&lt;/p></description></item><item><title>Monitored HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_monitored/</link><pubDate>Sat, 17 Feb 2024 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_monitored/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_monitored/Screenshot_20.png" alt="image">&lt;/p>
&lt;p>The Monitored HTB machine is a medium difficulty level HackTheBox Machine. The main tools and techniques used to crack this machine are:&lt;/p>
&lt;pre>&lt;code> - Dirsearch
 - CVE-2023-40931
 - NMAP UDP scan
 - SNMP enumeration with SNMPwalk
 - JohnTheRipper
 - SQL injection with SQLmap
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>We start a broad Nmap TCP scan by executing the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-sh" data-lang="sh">&lt;span class="line">&lt;span class="cl">sudo nmap -sS -T5 -vvv -p- 10.10.11.248 -Pn -oG nmap_inicial
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Where the arguments mean:&lt;/p></description></item><item><title>Codify HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_codify/</link><pubDate>Wed, 13 Sep 2023 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_codify/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_codify/codify.png" alt="image">&lt;/p>
&lt;p>The Codify HTB machine is a easy difficulty level HackTheBox Linux Machine. The main techniques used to crack this machine are:&lt;/p>
&lt;pre>&lt;code>- Hash cracking with JohnTheRipper
- Sandbox escape
- Batch Script Analysis
- Python Scripting
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>I started by running a NMAP scan to look for services and versions running on open ports;&lt;/p>
&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_codify/nmap.png" alt="image">&lt;/p>
&lt;p>We can see that the usual ports 22 and 80 are open. However, port 3000 is also open running node.js, which could be useful in the future since node.js has some known vulnerabilities in older versions.&lt;/p></description></item></channel></rss>