TryHackMe – Upload Vulnerabilities

The following write up is posted here to show how I worked through this on the TryHackMe platform to learn how to gain access to a webserver.

Task 1 – Getting Started

Start the VM and make the changes to your hosts file outlined in task 1.

cd ..
cd etc
sudo nano hosts

Copy and paste the information from task 1.

Ctrl-X to exit nano, when prompted hit Y to save then Return to save the file has hosts.

Q1: No Answer Needed.

A1: No Answer Needed.

Continue reading TryHackMe – Upload Vulnerabilities

Weekly Cybersecurity Wrap-up 3/18/24

Every week I publish interesting articles and ways to improve your understanding of cybersecurity.

Projects

Videos

Articles

Podcasts

Weekly Cybersecurity Wrap-up 3/11/24

Every week I publish interesting articles and ways to improve your understanding of cybersecurity.

Projects

Videos

Articles

Podcasts

Smashing Security – 363: Stuck streaming sticks, TikTok conspiracies, and spying cars

TryHackMe – Hashing – Crypto 101

This is just Task 5 & 6, because those ones were fun for me. I did this on my own VM of Kali and therefore may be different if you use the TryHackMe attackbox.

Task 5: Password Cracking

First step for me was to look up the wordlist and I’m glad I did, because rockyou was zipped.

I used the following to unzip the file in: /usr/share/wordlists/

sudo gzip -d rockyou.txt.gz

Now that is done we will proceed with the question at hand:

Q1: Crack this hash: $2a$06$7yoU3Ng8dHTXphAg913cyO6Bjs3K5lBnwq5FJyA6d01pMSrddr1ZG

Let’s put this in a file:

echo '$2a$06$7yoU3Ng8dHTXphAg913cyO6Bjs3K5lBnwq5FJyA6d01pMSrddr1ZG'> hash.txt

Look at the prefix. This means the hash type is bcrypt. Notice we added the to the front of the string and we added ‘> to the end of the string. Next, run this command:

john hash.txt --format=bcrypt --wordlist=/usr/share/wordlists/rockyou.txt

A1: 85208520

This is fun let’s do another…

Q2: Crack this hash: 9eb7ee7f551d2f0ac684981bd1f1e2fa4a37590199636753efe614d4db30e8e1

Again we put it in a file:

echo '9eb7ee7f551d2f0ac684981bd1f1e2fa4a37590199636753efe614d4db30e8e1'> hash256.txt

This is sha256 so we need to change the format on our command when we run JohntheRipper on it.

john hash256.txt --format=raw-sha256 --wordlist=/usr/share/wordlists/rockyou.txt

Our results look like this:

A2: halloween

Q3: Crack this hash: $6$GQXVvW4EuM$ehD6jWiMsfNorxy5SINsgdlxmAEl3.yif0/c3NqzGLa0P.S7KRDYjycw5bnYkF5ZtB8wQy8KnskuWQS3Yr1wQ0

This one is sha512crypt so we will change our format in the following command, but first we create our file:

echo '$6$GQXVvW4EuM$ehD6jWiMsfNorxy5SINsgdlxmAEl3.yif0/c3NqzGLa0P.S7KRDYjycw5bnYkF5ZtB8wQy8KnskuWQS3Yr1wQ0'> hash512crypt.txt

john hash512crypt.txt --format=sha512crypt --wordlist=/usr/share/wordlists/rockyou.txt

A3: spaceman

Q4: Bored of this yet? Crack this hash: b6b0d451bbf6fed658659a9e7e5598fe

This is Md5, but using rockyou won’t work. The hint says use the internet. So, using https://hashes.com/en/decrypt/hash, we find:

A4: funforyou

Task 6: Hashing for integrity checking

Q1: What’s the SHA1 sum for the amd64 Kali 2019.4 ISO? http://old.kali.org/kali-images/kali-2019.4/

Download and open the first file. The answer is on the first line:

A1: 186c5227e24ceb60deb711f1bdc34ad9f4718ff9

Q2: What’s the hashcat mode number for HMAC-SHA512 (key = $pass)?

Go to the website in the hint: https://hashcat.net/wiki/doku.php?id=example_hashes Do a find on “HMAC-SHA512” and you should find the answer:

A2: 1750

Weekly Cybersecurity Wrap-up 3/4/24

Projects

  • TryHackMe (Top 3% of users!) – OWASP Juice Shop – Complete
  • TryHackMe – Hashing – Crypto 101 – In Progress

Webinar

  • The Rising Cyber Risks Of Social Engineering & Personal Devices – Michela Menting, Jennifer Varner and Nasrin Rezai – A steady rise in social engineering attacks highlights the risks associated with the human element, with employees inadvertently providing entry points into enterprise networks through acts as simple as providing personal information gained from a LinkedIn account to an urgent text message that leads to a click on malware. These risks can be heightened even further when employees use their personal devices, which can lack the proper security software required to thwart potential attacks.

Articles

Podcasts

  • Cyberwire – Ep 2020 | 3.8.24 – From breach to battle: The escalating threat of Midnight Blizzard.

Weekly Cybersecurity Wrap-up 2/25/24

Projects

  • O’Reilly Live Course – CompTIA Security+ SY0-601 Crash Course with Sari Greene
  • TryHackMe (Top 3% of users!)OWASP Juice Shop – In Progress

Videos

Articles

Podcasts

Top 5 Cybersecurity Books

  1. Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door by Brian Krebs
  2. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon by Kim Zetter
  3. Worm: The First Digital World War by Mark Bowden
  4. Dark Territory: The Secret History of Cyber War Fred Kaplan
  5. Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations by Herbert Lin (Editor), Amy B. Zegart (Editor)

I can’t speak to how good all these books are but I follow Brian Krebs on LinkedIn and I think he is worth following. I will be reading all of these! I have read and written a review for Kim’s books here.

I’m currently reading The Hacker and The State by Ben Buchanan and I’m really enjoying it!

Who is Josephine Wolf?

Weekly Cybersecurity Wrap-up 2/19/24

Projects

  • TryHackMe – OWASP Top 10 – 2021 – Complete

Videos

  • Audio from NPR story

Articles

Podcasts

Weekly Cybersecurity Wrap-up 2/12/24

Projects

  • Took 2nd CompTIA practice Exam from LinkedIn and scored 77%. Only 1% better than the last test I took a week ago. I need to review my wrong answers and see what I need to focus on.
  • TryHackMe – OWASP Top 10 – 2021 – In Progress

Videos

Articles

Podcasts

Weekly Cybersecurity Wrap-up 2/5/24

Projects

  • Took CompTIA practice Exam from LinkedIn and scored 76%. I would like to bring that up to 90%, to make sure I can pass the exam. I need to focus on Architecture and Design and Implementation.
  • TryHackMe – OWASP Top 10 – 2021 – In Progress

Videos

Articles

Podcasts