<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Python Scripting on Chief Dennis' Blog</title><link>https://chiefdennis.github.io/tags/python-scripting/</link><description>Recent content in Python Scripting on Chief Dennis' Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Sun, 16 Jun 2024 13:07:16 +0100</lastBuildDate><atom:link href="https://chiefdennis.github.io/tags/python-scripting/index.xml" rel="self" type="application/rss+xml"/><item><title>Blurry HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_blurry/</link><pubDate>Sun, 16 Jun 2024 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_blurry/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_blurry/Scr_6.png#center" alt="image">&lt;/p>
&lt;p>The Blurry HTB machine is a medium difficulty level HackTheBox Machine. The main techniques and tools used to crack this machine are:&lt;/p>
&lt;pre>&lt;code>- ClearML
- CVE-2024-24590
- Json deserialization
- Scipt analysis
- Fickling
- Python scripting
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>We start a broad Nmap scan by executing the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-sh" data-lang="sh">&lt;span class="line">&lt;span class="cl">sudo nmap -sS -T5 -vvv -p- 10.10.11.19 -Pn -oG nmap_inicial
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Where the arguments mean:&lt;/p></description></item><item><title>Codify HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_codify/</link><pubDate>Wed, 13 Sep 2023 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_codify/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_codify/codify.png" alt="image">&lt;/p>
&lt;p>The Codify HTB machine is a easy difficulty level HackTheBox Linux Machine. The main techniques used to crack this machine are:&lt;/p>
&lt;pre>&lt;code>- Hash cracking with JohnTheRipper
- Sandbox escape
- Batch Script Analysis
- Python Scripting
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>I started by running a NMAP scan to look for services and versions running on open ports;&lt;/p>
&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_codify/nmap.png" alt="image">&lt;/p>
&lt;p>We can see that the usual ports 22 and 80 are open. However, port 3000 is also open running node.js, which could be useful in the future since node.js has some known vulnerabilities in older versions.&lt;/p></description></item></channel></rss>