My name is Chris and I am a Jack of all Trades, technophile with a special focus on cybersecurity and cloud solutions. I am originally from Toronto, Ontario, and currently living in the Cayman Islands.
Below are just some of the vendors and technologies I've worked with, implemented or maintained.
Christopher Soehnlein2020-10-20T13:26:00-05:00October 20th, 2020|Categories: HTB, Technology|Tags: Active, CME, CrackMapExec, GetUserSPNs, HTB, Invoke-PowerShellTcp, OSCP|
Today I explore Active from HTB; an OSCP like box featuring a great approach to SMB enumeration with SMBClient and CrackMapExec.
Christopher Soehnlein2020-10-17T10:55:46-05:00October 17th, 2020|Categories: HTB, Technology|Tags: Cronos, HTB, OSCP|
Today I explore Cronos from HTB; an OSCP like box featuring some vhost enumeration, SQL login bypass techniques and command injection.
Christopher Soehnlein2020-10-17T10:40:58-05:00October 17th, 2020|Categories: HTB, Technology|Tags: Bludit, Blunder, CewL, HTB, OSCP, WFUZZ|
I try using PwnBox from HTB to do the Blunder box. It turns out to be a blunder for me and navigating the web UI.
Christopher Soehnlein2020-10-13T16:33:17-05:00October 13th, 2020|Categories: HTB, Technology|Tags: cgi-bin, GTFOBins, Perl, Shellshock|
Today I explore Shocker from HTB; a OSCP like box featuring a Shellshock exploitable web server. Once on the box we use perl to escalate sudo.
Christopher Soehnlein2020-10-13T10:07:20-05:00October 13th, 2020|Categories: HTB, Technology|Tags: MS16-098, Rejetto HTTP|
Today I explore Optimum from HTB; a OSCP like box featuring a Rejetto HTTP File Server v2.3 and a MS16-098 privilege escalation.
Christopher Soehnlein2020-10-10T10:16:07-05:00October 10th, 2020|Categories: HTB, Technology|Tags: Cache, docker, HTB, Memcache, OperEMR, WSO|
Cache from Hack the Box (HTB) explores exploits available for the OpenEMR System. Once we get on the system we used Memcache to escalate.
© 2020 • ISLANDDOG • Powered by WordPress