My name is Chris and I am a Jack of all Trades, technophile with a special focus on cybersecurity and cloud solutions. I am originally from Toronto, Ontario, and currently living in the Cayman Islands.
Below are just some of the vendors and technologies I've worked with, implemented or maintained.
Christopher Soehnlein2020-10-13T10:07:20-05:00October 13th, 2020|Categories: HTB, Technology|Tags: MS16-098, Rejetto HTTP|
Today I explore Optimum from HTB; a OSCP like box featuring a Rejetto HTTP File Server v2.3 and a MS16-098 privilege escalation.
Christopher Soehnlein2020-10-10T10:16:07-05:00October 10th, 2020|Categories: HTB, Technology|Tags: Cache, docker, HTB, Memcache, OperEMR, WSO|
Cache from Hack the Box (HTB) explores exploits available for the OpenEMR System. Once we get on the system we used Memcache to escalate.
Christopher Soehnlein2020-10-09T10:30:58-05:00October 9th, 2020|Categories: HTB, Technology|Tags: Elastix 2.2.0, HTB, LFI, OSCP|
Using Beep from HTB I exploit Elastix 2.2.0 using a local file inclusion (LFI). I then attempted to password spray SSH and run into issues with ciphers.
Christopher Soehnlein2020-10-08T15:06:38-05:00October 8th, 2020|Categories: HTB, Technology|Tags: afd.sys, HTB, Metasploit, MS11-046, OSCP|
Using Devel from HTB I will show you how to exploit a Windows Server with anonymous FTP enabled and IIS. We will then run MS11-046 exploit to get root.
Christopher Soehnlein2020-10-08T11:31:23-05:00October 8th, 2020|Categories: HTB, Technology|Tags: EternalBlue, HTB, Metasploit, MS17-010, OSCP|
Today using Legacy from HTB I will show you how to exploit MS17-010 EternalBlue with a custom shellcode and without the use of Metasploit.
Christopher Soehnlein2020-10-08T09:42:15-05:00October 8th, 2020|Categories: HTB, Technology|Tags: HTB, Lame, Metasploit, OSCP, SAMBA, SMB|
Today using Lame from HTB I will show you how to exploit SMB shares with null authentication. This is for SAMBA 3.0.20 and without the need for Metasploit.
© 2020 • ISLANDDOG • Powered by WordPress