From Noob to Hacker https://aojanzen.github.io/ Things I have learned along the way en-us Wed, 15 Jun 2022 00:00:00 +0200 https://aojanzen.github.io/2022/06/15/credentialstuffingandpasswordspraying.html https://aojanzen.github.io/2022/06/15/credentialstuffingandpasswordspraying.html <![CDATA[Credential Stuffing and Password Spraying]]> Credential Stuffing and Password Spraying

Credential stuffing means taking breached credentials (e.g. from Breach Parse or website like weleakinfo.to – before it was seized by law enforcement) and trying to use them to log in to an account on a target.

Weiter lesen...

]]>
Wed, 15 Jun 2022 00:00:00 +0200
https://aojanzen.github.io/2022/06/12/bruteforceattacks.html https://aojanzen.github.io/2022/06/12/bruteforceattacks.html <![CDATA[Brute Force Attacks]]> Brute Force Attacks

Attacking SSH is not easy. There are three approaches if we want to try it anyway: we can try to find login credentials by brute force or by weak or default credentials.

Weiter lesen...

]]>
Sun, 12 Jun 2022 00:00:00 +0200
https://aojanzen.github.io/2022/06/11/manualexploitation.html https://aojanzen.github.io/2022/06/11/manualexploitation.html <![CDATA[Manual Exploitation]]> Manual Exploitation

After gaining root with MetaSploit, we will gain access to the Kioptrix machine with manual exploitation in this video, using the vulnerability of mod_ssl and an exploit called Open*uck.

Weiter lesen...

]]>
Sat, 11 Jun 2022 00:00:00 +0200
https://aojanzen.github.io/2022/06/10/gainingrootwithmetasploit.html https://aojanzen.github.io/2022/06/10/gainingrootwithmetasploit.html <![CDATA[Gaining Root with Metasploit]]> Gaining Root with Metasploit

This is the culmination point of the previous lessons of PEH, the first popped shell, using MetaSploit on the Samba 2.2.1a vulnerability on port 139 (“trans2open”, remote buffer overflow).

Weiter lesen...

]]>
Fri, 10 Jun 2022 00:00:00 +0200
https://aojanzen.github.io/2022/06/09/stagedvsnon_stagedpayloads.html https://aojanzen.github.io/2022/06/09/stagedvsnon_stagedpayloads.html <![CDATA[Staged vs Non-Staged Payloads]]> Staged vs Non-Staged Payloads

A payload is code that is sent to a target machine to exploit a vulnerability and get a shell on that machine. There are different types of payloads: Windows payloads, Linux payloads, Meterpreter payload, Python payload, etc. They can be staged and non-staged.

Weiter lesen...

]]>
Thu, 09 Jun 2022 00:00:00 +0200
https://aojanzen.github.io/2022/06/09/enumeratingssh.html https://aojanzen.github.io/2022/06/09/enumeratingssh.html <![CDATA[Enumerating SSH]]> Enumerating SSH

The nmap scan has revealed that SSH (OpenSSH 2.9p2) runs on the open port 22. If our scan does not show a software version, we can try to figure it out by connecting to the open port with ssh.

Weiter lesen...

]]>
Thu, 09 Jun 2022 00:00:00 +0200
https://aojanzen.github.io/2022/06/09/scanningwithnessus.html https://aojanzen.github.io/2022/06/09/scanningwithnessus.html <![CDATA[Scanning with Nessus]]> Scanning with Nessus

Nessus is a vulnerability scanner, a tool that is frequently used in penetration testing. It might even be the first tool that one uses in an external assessment.

Weiter lesen...

]]>
Thu, 09 Jun 2022 00:00:00 +0200
https://aojanzen.github.io/2022/06/08/reverservsbindshell.html https://aojanzen.github.io/2022/06/08/reverservsbindshell.html <![CDATA[Reverse Shell vs Bind Shell]]> Reverse Shell vs Bind Shell

This is the first section of the “Exploitation Basics” chapter.

In this section, different ways of “popping a shell”, which means getting access to a terminal on a target machine, will be discussed. In particular, the differences between a Reverse Shell and a Bind Shell will be discussed.

Weiter lesen...

]]>
Wed, 08 Jun 2022 00:00:00 +0200
https://aojanzen.github.io/2022/06/06/researchingpotentialvulnerabilities.html https://aojanzen.github.io/2022/06/06/researchingpotentialvulnerabilities.html <![CDATA[Researching Potential Vulnerabilities]]> Researching Potential Vulnerabilities

This blog is about identifying and researching potential vulnerabilities, starting from the results that we have found for Kioptrix so far.

Weiter lesen...

]]>
Mon, 06 Jun 2022 00:00:00 +0200
https://aojanzen.github.io/2022/06/05/enumeratingsmb.html https://aojanzen.github.io/2022/06/05/enumeratingsmb.html <![CDATA[Enumerating SMB]]> Enumerating SMB

SMB (Server Message Block) is a file-sharing protocol used in networks to up- and download files to a shared folder. SMB is typically used in work and internal environments.

Weiter lesen...

]]>
Sun, 05 Jun 2022 00:00:00 +0200
https://aojanzen.github.io/2022/06/04/enumeratinghttpandhttps.html https://aojanzen.github.io/2022/06/04/enumeratinghttpandhttps.html <![CDATA[Enumerating HTTP and HTTPS]]> Enumerating HTTP and HTTPS

In this section, the open ports found with the Nmap scan are examined more closely, and additional information about services running on the webserver and sub-directories of the webpage are identified with a tool called dirbuster.

Weiter lesen...

]]>
Sat, 04 Jun 2022 00:00:00 +0200
https://aojanzen.github.io/2022/06/03/scanningwithnmap.html https://aojanzen.github.io/2022/06/03/scanningwithnmap.html <![CDATA[Scanning with Nmap]]> Scanning with Nmap

In this section, we will learn how to use Nmap to scan a target machine for open ports and services running on the machine that can be exploited in the following step.

Weiter lesen...

]]>
Fri, 03 Jun 2022 00:00:00 +0200
https://aojanzen.github.io/2022/06/03/installingkioptrix.html https://aojanzen.github.io/2022/06/03/installingkioptrix.html <![CDATA[Installing Kioptrix]]> Installing Kioptrix

This is the beginning of the “Scanning and Enumeration” section of “Practical Ethical Hacking”. We will use a vulnerable virtual machine called Kioptrix.

Weiter lesen...

]]>
Fri, 03 Jun 2022 00:00:00 +0200
https://aojanzen.github.io/2022/06/03/utilizingsocialmedia.html https://aojanzen.github.io/2022/06/03/utilizingsocialmedia.html <![CDATA[Utilizing Social Media]]> Utilizing Social Media

Websites liked Linkedin or Twitter can deliver valuable information, too, e.g. badge photos or desk photos.

Weiter lesen...

]]>
Fri, 03 Jun 2022 00:00:00 +0200
https://aojanzen.github.io/2022/06/02/googlefu.html https://aojanzen.github.io/2022/06/02/googlefu.html <![CDATA[Google Fu]]> Google Fu

Google is a super helpful source of information for pentesters that makes a successful pentester.

Weiter lesen...

]]>
Thu, 02 Jun 2022 00:00:00 +0200
https://aojanzen.github.io/2022/06/02/informationgatheringwithburpsuite.html https://aojanzen.github.io/2022/06/02/informationgatheringwithburpsuite.html <![CDATA[Information Gathering with Burp Suite]]> Information Gathering with Burp Suite

Burp Suite is a web proxy. It can intercept web traffic for us. The Community Edition has a limited functionality, one can only select Temporary Project upon startup, then click on Start burp (using the Burp defaults).

Weiter lesen...

]]>
Thu, 02 Jun 2022 00:00:00 +0200
https://aojanzen.github.io/2022/06/01/huntingsubdomains.html https://aojanzen.github.io/2022/06/01/huntingsubdomains.html <![CDATA[Hunting Subdomains (Parts 1 and 2)]]> Hunting Subdomains (Parts 1 and 2)

One of the first steps in reconnaissance is to find out which subdomains belong to the target. One reason is that one might find subdomains which should not be publicly accessible, e.g. dev.tesla.com, another reason is that it gives us a chance to attack multiple websites and not only one.

Weiter lesen...

]]>
Wed, 01 Jun 2022 00:00:00 +0200
https://aojanzen.github.io/2022/06/01/identifyingwebsitetechnologies.html https://aojanzen.github.io/2022/06/01/identifyingwebsitetechnologies.html <![CDATA[Identifying Website Technologies]]> Identifying Website Technologies

In this lecture, TCM presents several tools to analyse which technologies and frameworks have been used to create a website.

Weiter lesen...

]]>
Wed, 01 Jun 2022 00:00:00 +0200
https://aojanzen.github.io/2022/05/30/huntingbreachedpasswordswithdehashed.html https://aojanzen.github.io/2022/05/30/huntingbreachedpasswordswithdehashed.html <![CDATA[Hunting Breached Credentials with DeHashed]]> Hunting Breached Credentials with DeHashed

TCM demonstrates a website called DeHashed.com, which is only available as a paid service and can only be paid in cryptocurrency.

Weiter lesen...

]]>
Mon, 30 May 2022 00:00:00 +0200
https://aojanzen.github.io/2022/05/29/gatheringbreachedcredentials.html https://aojanzen.github.io/2022/05/29/gatheringbreachedcredentials.html <![CDATA[Gathering Breached Credentials with Breach-Parse]]> Gathering Breached Credentials with Breach-Parse

Finding user names and passwords in breached credentials is a very important step and part of every pentest.

Weiter lesen...

]]>
Sun, 29 May 2022 00:00:00 +0200
https://aojanzen.github.io/2022/05/28/takingnotes.html https://aojanzen.github.io/2022/05/28/takingnotes.html <![CDATA[Taking Notes]]> Taking Notes

Use notekeeping tools to write key information down for later referral. Write down the actual commands and take screenshots!

Weiter lesen...

]]>
Sat, 28 May 2022 00:00:00 +0200
https://aojanzen.github.io/2022/05/28/passivereconnaissanceoverview.html https://aojanzen.github.io/2022/05/28/passivereconnaissanceoverview.html <![CDATA[An Overview of Passive Recon(naissance)]]> An Overview of Passive Recon(naissance)

Passive reconnaissance means gathering information that is already available on the internet, whereas active scanning begins with scanning of hosts.

Weiter lesen...

]]>
Sat, 28 May 2022 00:00:00 +0200
https://aojanzen.github.io/2022/05/28/identifyingourtarget.html https://aojanzen.github.io/2022/05/28/identifyingourtarget.html <![CDATA[Identifying Our Target]]> Identifying Our Target

To find a client that we can attack (legally) to practice reconnaissance, we use the public bugbounty program bugcrowd.com.

Weiter lesen...

]]>
Sat, 28 May 2022 00:00:00 +0200
https://aojanzen.github.io/2022/05/28/discoveringemailadresses.html https://aojanzen.github.io/2022/05/28/discoveringemailadresses.html <![CDATA[Discovering Email Adresses]]> Discovering Email Adresses

In this part, it will be demonstrated how one can find and verify email addresses as a part of reconnaissance on a target.

Weiter lesen...

]]>
Sat, 28 May 2022 00:00:00 +0200
https://aojanzen.github.io/2022/05/28/introductionpython.html https://aojanzen.github.io/2022/05/28/introductionpython.html <![CDATA[Introduction to Python]]> Introduction to Python

This is part of the “Introduction to Python” module of TCM Sec’s “Practical Ethical Hacking” course. I have left out most of the material, which covers a basic introduction to Python. The rest is an application of Python for network programming.

Weiter lesen...

]]>
Sat, 28 May 2022 00:00:00 +0200
https://aojanzen.github.io/2022/05/28/fivestagesofethicalhacking.html https://aojanzen.github.io/2022/05/28/fivestagesofethicalhacking.html <![CDATA[The Five Stages of Ethical Hacking]]> The Five Stages of Ethical Hacking

The five stages of ethical hacking are the same, irrespective if you hack into a network or a website:

Weiter lesen...

]]>
Sat, 28 May 2022 00:00:00 +0200
https://aojanzen.github.io/2022/05/25/scriptingwithbash.html https://aojanzen.github.io/2022/05/25/scriptingwithbash.html <![CDATA[Scripting with Bash]]> Scripting with Bash

This post is based on TCM Sec’s “Practical Ethical Hacking” course. It is the last topic in the “Introduction to Linux” chapter.

Weiter lesen...

]]>
Wed, 25 May 2022 00:00:00 +0200
https://aojanzen.github.io/2022/05/22/introductiontolinux.html https://aojanzen.github.io/2022/05/22/introductiontolinux.html <![CDATA[Introduction to Linux]]> Introduction to Linux

The following notes are based on TCM Security’s ‘Practical Ethical Hacking’. They refer to the Kali Linux operating system.

Weiter lesen...

]]>
Sun, 22 May 2022 00:00:00 +0200
https://aojanzen.github.io/2022/05/21/networkingrefresher.html https://aojanzen.github.io/2022/05/21/networkingrefresher.html <![CDATA[Networking Refresher]]> Networking Refresher

The following notes are based on TCM Security’s ‘Practical Ethical Hacking’. They provide a short refresher of the most important concepts of networks.

Weiter lesen...

]]>
Sat, 21 May 2022 00:00:00 +0200
https://aojanzen.github.io/2022/04/12/rps.html https://aojanzen.github.io/2022/04/12/rps.html <![CDATA[picoCTF: RPS]]> picoCTF: RPS

Another challenge from picoCTF 2022, worth 200 points.

Weiter lesen...

]]>
Tue, 12 Apr 2022 00:00:00 +0200
https://aojanzen.github.io/2022/04/12/fresh_java.html https://aojanzen.github.io/2022/04/12/fresh_java.html <![CDATA[picoCTF: Fresh Java]]> picoCTF: Fresh Java

Another CTF challenge from picoCTF 2022 for 200 points.

Weiter lesen...

]]>
Tue, 12 Apr 2022 00:00:00 +0200
https://aojanzen.github.io/2022/04/06/unpackme_py.html https://aojanzen.github.io/2022/04/06/unpackme_py.html <![CDATA[picoCTF: unpackme.py]]> picoCTF: unpackme.py

Another challenge from picoCTF 2022, worth 200 points.

Weiter lesen...

]]>
Wed, 06 Apr 2022 00:00:00 +0200
https://aojanzen.github.io/2022/04/06/local_authority.html https://aojanzen.github.io/2022/04/06/local_authority.html <![CDATA[picoCTF: Local Authority]]> picoCTF: Local Authority

Another challenge form picoCTF 2022 worth 100 points:

Weiter lesen...

]]>
Wed, 06 Apr 2022 00:00:00 +0200
https://aojanzen.github.io/2022/04/04/picoctf_sqli_lite.html https://aojanzen.github.io/2022/04/04/picoctf_sqli_lite.html <![CDATA[picoCTF: SQLiLite]]> picoCTF: SQLiLite

The following challenge was part of the picoCTF 2022 contest, a SQL injection, worth 300 points:

Weiter lesen...

]]>
Mon, 04 Apr 2022 00:00:00 +0200
https://aojanzen.github.io/2022/04/04/picoctf_basic_file_exploit.html https://aojanzen.github.io/2022/04/04/picoctf_basic_file_exploit.html <![CDATA[picoCTF: basic-file-exploit]]> picoCTF: basic-file-exploit

This is my first writeup about a CTF challenge. The following was the first task in the 100’s (i.e. lowest) category of the 2022 picoCTF challenge:

Weiter lesen...

]]>
Mon, 04 Apr 2022 00:00:00 +0200
https://aojanzen.github.io/2022/03/28/hello_world.html https://aojanzen.github.io/2022/03/28/hello_world.html <![CDATA[Hello World!]]> Hello World!

Hi! My name is Andreas, I am from Germany. Let me share a few words about what happened so far…

Weiter lesen...

]]>
Mon, 28 Mar 2022 00:00:00 +0200