Michael David
@micky_thegeek
Followers
1K
Following
6K
Media
299
Statuses
3K
Design | Security | Software tinkerer π₯οΈ "...πΆπ ππ½π πππΉ ππ» ππ½π πΉπΆπ, πΎπβπ πππ πΆπ·πππ ππ½π πΉππππΎππΆππΎππ"
Where my mind's at.
Joined March 2016
I just pwned Network Services 1 & 2 rooms on @RealTryHackMe, and it was an interesting deep dive into real-world service exploits. In these rooms I moved from simple port scans to footholds and privilege escalations. Here are my key takeaways.π§΅ https://t.co/HrqzEUdFcW
tryhackme.com
Enumerating and Exploiting More Common Network Services \u0026 Misconfigurations
4
5
24
If youβre interested in getting into: Security Engineering SOC Analysis Reverse Malware Engineering Cybersecurity Research Comment and retweet this post, and Iβll send you guidelines and tools directly in your DM.
1K
830
2K
REMINDER! We're giving away FIVE free 6-month licenses to @pentesterlab. β
Comment BADGELIFE and retweet this post to enter. Additionally, pre-order a custom badge at https://t.co/7CskJUfk6k for a chance to win one of FIVE Annual VIP+ subscription to @hackthebox_eu.
shop.bugbountydefcon.com
Pre-order a custom variant of the bug bounty village electronic badge.
To celebrate our badge launch, we're giving away FIVE free 6-month licenses to @pentesterlab. β
Comment BADGELIFE and retweet this post to enter. Additionally, pre-order a custom badge at https://t.co/7CskJUfk6k for a chance to win one of FIVE Annual VIP+ subscription to
142
132
200
Got this badge from @RealTryHackMe challenge Cracking all those hashes
tryhackme.com
Sharing Your Badge
0
0
0
Take an in-depth look at scanning with Nmap, a powerful network scanning tool. https://t.co/VPf1bTu5C5
0
0
0
For Active Recon, learn how to use simple tools such as traceroute, ping, telnet, and even a web browser to gather information. https://t.co/lNtKQ7aXmT
tryhackme.com
Learn how to use simple tools such as traceroute, ping, telnet, and a web browser to gather information.
0
0
1
Completed this room to learn essential tools for passive reconnaissance such as whois, nslookup, and dig. https://t.co/mOVryp1nlB
tryhackme.com
Learn about the essential tools for passive reconnaissance, such as whois, nslookup, and dig.
0
0
0
Just completed the Red Team Engagements room to learn steps and procedures of a red team engagement, including planning, frameworks, and documentation. https://t.co/g9zb1lwJH5
tryhackme.com
Learn the steps and procedures of a red team engagement, including planning, frameworks, and documentation.
0
0
0
END:I've learnt that Pentesting thrives on curiosity and persistence. Every overlooked service can become a critical pivot point. Thank you for reading to this point! Keep learning! Keep hacking! π§ββοΈ #Pentest #CTF #CyberSecurity @akintunero @damnsec1 @Olufela_Jr @Secfortress
0
0
2
Other activities worthy of mentioning was on FTP and Telnet. On FTP, an anonymous login to a public share exposed a .ssh backup containing a userβs private key. On Telnet, a bespoke backdoor only responded to .HELP and .RUN commands, which ultimately yielded a shell.
1
0
0
The next and final step was to crack Carlβs password and then use those credentials to log in and grab the flag. So, I copied the hash into a .txt file and used John the Ripper to crack the hash and voila!
1
0
0
Diving deeper, the 'mysql_hashdump' module was then used to extract usernames along with their encrypted password hashes from the database. I found a non-default user named 'Carl'.π
1
0
0
Going further, I used another Metasploit module 'mysql_schemadump' to extract the schema information from the DB server. This is quite handy for understanding the overall structure, dumping the tables and columns names of the whole database.
1
0
1
ANother interesting one was the MySQL lab, THM gave me credentialed access here and I used it to find the service version and enumerate the databases on the target host. This was achieved with Nmap (-sV -p3306) and Metasploit's module (mysql_sql).
1
0
0
When brute-forcing with Hydra, I used 'rockyou.txt' (a common list that contains 14million passwords). By default, Hydra stops at the first valid credential, but you can force-quit earlier with -f. I finally got the credentials and eventually gain access to the machine
1
0
0
Next lab was a βwowβ moment for me. It was on SMTP enumeration and exploitation. Using Metasploit and Hydra, I discovered valid usernames. A simple typo in my SSH brute-force stalled my progress but I ended up reusing the correct credentials across multiple services.
1
0
0
First, I sharpened my Nmap skills learning when to run a quick top-100 scan (nmap -T4 -F) versus a full all-ports scan (nmap -T4 -p-), and how to throttle packets (--min-rate) to discover potential vulnerabilities of target machines.
1
0
0
Elon Musk was asked why he still works, while being worth billions of dollarsβ¦ π
564
2K
13K
Just finished this 'easy' but 'not-so-easy' Network Services Room on @RealTryHackMe - I learnt how enumerate and exploit a variety of network services (namely SMB, FTP, and Telnet) plus misconfigurations.
tryhackme.com
Learn about, then enumerate and exploit a variety of network services and misconfigurations.
0
0
1