My name is Chris and I am a Jack of all Trades, technophile with a special focus on cybersecurity and cloud solutions. I am originally from Toronto, Ontario, and currently living in the Cayman Islands.
Below are just some of the vendors and technologies I've worked with, implemented or maintained.
Christopher Soehnlein2020-10-10T10:39:40-05:00October 3rd, 2020|Categories: HTB, Technology|Tags: Blackfield, CrackMapExec, Evil-WinRM, HTB, john, Seatbelt, SeBackupPrivilege, smbmap, Windows|
Today in Blackfield from HTB I explore a real-world example of a Windows Server when an account used for a specific task is not removed after.
Christopher Soehnlein2020-10-08T14:13:24-05:00October 1st, 2020|Categories: HTB, Technology|Tags: EncFS, HTB, Pi-Hole, RSync, SQL, squid, Unbalanced|
Unbalanced is a (really) Hard CTF style box from HTB. It features a squid web proxy, some EncFS encrypted data, and a privilege escalation through Pi-Hole.
Christopher Soehnlein2020-10-08T14:13:35-05:00September 17th, 2020|Categories: HTB, Technology|Tags: Compromised, disabled_functions, Ghidra, HTB, LiteCart, MySQL, PHP, phpinfo()|
Compromised from HTB is an incident response type box in which a Linux environment and eCommerce solution, LiteCart have been exploited.
Christopher Soehnlein2020-11-01T10:36:13-05:00November 1st, 2020|Categories: HTB, Technology|Tags: Capcom.sys, CME, CrackMapExec, Evil-WinRM, Fuse, HTB, rpcclient, seloaddriverprivilege|
Fuse from HTB is a Medium Windows vulnerability assessment based box in which you build a brute-force list Papercut and escalate with seloaddriverprivilege.
Christopher Soehnlein2020-10-22T11:01:34-05:00October 21st, 2020|Categories: Technology, Cyber Security, HTB|Tags: Exploits, HTB, Offensive Security, OSCP, Windows|
Below is a list of OSCP style boxes provided by @TJ_Null on Twitter. I will be going through a box each day until my exam! Check back regularly for updates.
Christopher Soehnlein2020-10-20T13:26:00-05:00October 20th, 2020|Categories: HTB, Technology|Tags: Active, CME, CrackMapExec, GetUserSPNs, HTB, Invoke-PowerShellTcp, OSCP|
Today I explore Active from HTB; an OSCP like box featuring a great approach to SMB enumeration with SMBClient and CrackMapExec.
Christopher Soehnlein2020-10-17T10:55:46-05:00October 17th, 2020|Categories: HTB, Technology|Tags: Cronos, HTB, OSCP|
Today I explore Cronos from HTB; an OSCP like box featuring some vhost enumeration, SQL login bypass techniques and command injection.
Christopher Soehnlein2020-10-17T10:40:58-05:00October 17th, 2020|Categories: HTB, Technology|Tags: Bludit, Blunder, CewL, HTB, OSCP, WFUZZ|
I try using PwnBox from HTB to do the Blunder box. It turns out to be a blunder for me and navigating the web UI.
Christopher Soehnlein2020-10-13T16:33:17-05:00October 13th, 2020|Categories: HTB, Technology|Tags: cgi-bin, GTFOBins, Perl, Shellshock|
Today I explore Shocker from HTB; a OSCP like box featuring a Shellshock exploitable web server. Once on the box we use perl to escalate sudo.
© 2020 • ISLANDDOG • Powered by WordPress