<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>HTB Writeups on s4yhii&#39;s blog</title>
    <link>https://blog.s4yhii.com/categories/htb-writeups/</link>
    <description>Recent content in HTB Writeups on s4yhii&#39;s blog</description>
    <image>
      <title>s4yhii&#39;s blog</title>
      <url>https://blog.s4yhii.com/%3Clink%20or%20path%20of%20image%20for%20opengraph,%20twitter-cards%3E</url>
      <link>https://blog.s4yhii.com/%3Clink%20or%20path%20of%20image%20for%20opengraph,%20twitter-cards%3E</link>
    </image>
    <generator>Hugo -- 0.155.3</generator>
    <language>en-us</language>
    <lastBuildDate>Tue, 25 Mar 2025 08:00:00 -0500</lastBuildDate>
    <atom:link href="https://blog.s4yhii.com/categories/htb-writeups/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Cyber Apocalypse 2025 - 6x Web Challenges Writeup</title>
      <link>https://blog.s4yhii.com/posts/cyberapocalypse-ctf2025-web/</link>
      <pubDate>Tue, 25 Mar 2025 08:00:00 -0500</pubDate>
      <guid>https://blog.s4yhii.com/posts/cyberapocalypse-ctf2025-web/</guid>
      <description>&lt;p&gt;I participated as a member of team &lt;strong&gt;CibersecUNI&lt;/strong&gt;. This time i managed to solve all 6/6 challenges in the web category.&lt;/p&gt;
&lt;h1 id=&#34;whispers-of-the-moonbeam&#34;&gt;Whispers of the Moonbeam&lt;/h1&gt;
&lt;p&gt;Observando las funciones, nos dan una pista que se puede inyectar comandos con ;.&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;alt text&#34; loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/CA2025/image-1.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;Usando el comando gossip, puedo listar los archivos, se visualiza el archivo flag.txt, y con un simple ; puedo concatenar el comando cat para leer la flag.&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;gossip&lt;span class=&#34;p&#34;&gt;;&lt;/span&gt; cat flag.txt
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Obtenemos la flag. 🎉
HTB{Sh4d0w_3x3cut10n_1n_Th3_M00nb34m_T4v3rn_78cb9b70be3bf077e608865b967b5ab1}&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cyber Apocalypse 2024 - 4x Web Challenges Writeup</title>
      <link>https://blog.s4yhii.com/posts/2024-03-14-cyberapocalypse-ctf2024-web/</link>
      <pubDate>Thu, 14 Mar 2024 08:00:00 -0500</pubDate>
      <guid>https://blog.s4yhii.com/posts/2024-03-14-cyberapocalypse-ctf2024-web/</guid>
      <description>&lt;p&gt;I participated as a member of team &lt;strong&gt;CibersecUNI&lt;/strong&gt;. In the web category we solved 6/9 challenges as a team. In this writeup I will go through the ones that I have solved:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#testimonial&#34;&gt;Testimonial&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#labyrinth-linguist&#34;&gt;Labyrinth Linguist&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#timekorp&#34;&gt;TimeKORP&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#locktalk&#34;&gt;Locktalk&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h1 id=&#34;testimonial&#34;&gt;Testimonial&lt;/h1&gt;
&lt;p&gt;As the leader of the Revivalists you are determined to take down the KORP, you and the best of your faction&amp;rsquo;s hackers have set out to deface the official KORP website to send them a message that the revolution is closing in.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cross Site Scripting (XSS)</title>
      <link>https://blog.s4yhii.com/posts/2022-05-10-cross-site-scripting-xss/</link>
      <pubDate>Wed, 18 May 2022 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2022-05-10-cross-site-scripting-xss/</guid>
      <description>&lt;p&gt;Cross-site scripting known as XSS is a web vulnerability in which malicious scripts are injected int benign and trusted websites. XSS occur when an attacker send malicious code in any user input fields in a browser to a different end-user.&lt;/p&gt;
&lt;h2 id=&#34;mechanisms&#34;&gt;Mechanisms&lt;/h2&gt;
&lt;p&gt;In an XSS attack the attacker inject script in HTML code so you&amp;rsquo;ll have to know javascript and HTML syntax, wbe uses scripts to control client-side application logic and make the website interactive, for example this script generates &lt;em&gt;Hello!&lt;/em&gt; pop-up on the web page:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cyber Apocalypse 2023 2x Web Challenges Writeup</title>
      <link>https://blog.s4yhii.com/posts/2022-05-19-htb-cyber-apocalypse-ctf-web-writeups/</link>
      <pubDate>Wed, 18 May 2022 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2022-05-19-htb-cyber-apocalypse-ctf-web-writeups/</guid>
      <description>&lt;h1 id=&#34;kryptos-support&#34;&gt;Kryptos Support&lt;/h1&gt;
&lt;p&gt;Checking the web page of this challenge gives a form to send an issue and an admin will review that issue.
&lt;img loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/htb/ctf/ctf1.jpg&#34;&gt;&lt;/p&gt;
&lt;p&gt;So its interesting, maybe the admin will click in that issue and we can inject some kind of payload, like an stored xss, these approach is similar to the bankrobber box in htb.&lt;/p&gt;
&lt;p&gt;So we can craft the payload to steal the cookie of the admin or the user who will review out ticket.&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackTheBox Jarvis</title>
      <link>https://blog.s4yhii.com/posts/2021-11-15-jarvis-htb/</link>
      <pubDate>Mon, 15 Nov 2021 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2021-11-15-jarvis-htb/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Machine IP&lt;/strong&gt;: 10.10.10.143&lt;/p&gt;
&lt;h3 id=&#34;reconocimiento&#34;&gt;Reconocimiento&lt;/h3&gt;
&lt;p&gt;Primero hacemos un escaneo de puertos para saber cuales están abiertos y conocer sus servicios correspondientes&lt;/p&gt;
&lt;h3 id=&#34;nmap&#34;&gt;Nmap&lt;/h3&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/htb/jarvis/nmap.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;Como vemos tiene el puerto 80 abierto, que es el http,  veremos en el navegador de que se trata y analizaremos la web.&lt;/p&gt;
&lt;h3 id=&#34;wappalyzer&#34;&gt;Wappalyzer&lt;/h3&gt;
&lt;p&gt;Usando la extensión wappalizer para identificar las tecnologías usadas en la web, encontramos que la web está usando phpmyadmin version 4.8&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/htb/jarvis/wappa.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;Al hacer un poco de research encontramos la siguiente vulnerabilidad &lt;a href=&#34;https://www.exploit-db.com/exploits/50457&#34;&gt;phpMyAdmin 4.8.1 - Remote Code Execution (RCE)&lt;/a&gt; , que se aprovecha del ejecutar comandos a traves de parametros sql.&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackTheBox Lame</title>
      <link>https://blog.s4yhii.com/posts/2021-09-08-lame-htb/</link>
      <pubDate>Wed, 08 Sep 2021 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2021-09-08-lame-htb/</guid>
      <description>&lt;h2 id=&#34;enumeración&#34;&gt;Enumeración&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;System IP: 10.10.10.3&lt;/strong&gt;&lt;/p&gt;
&lt;h2 id=&#34;matriz-de-la-maquina&#34;&gt;Matriz de la maquina&lt;/h2&gt;
&lt;p&gt;Esta matriz nos muestra las características de explotación de la maquina.&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;Matriz de la maquina&#34; loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/htb/lame/matrix.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Enumeración de servicios&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Server IP Address&lt;/th&gt;
          &lt;th&gt;Ports Open&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;10.10.10.3&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;TCP&lt;/strong&gt;: 21,22,139,445,3632&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;strong&gt;Nmap Scan Resultados:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Usando el siguiente comando para enumerar las versiones y servicios que corren en cada puerto luego de hacer un escaneo de puertos abiertos.&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;nmap -A -n -Pn -p21,22,139,445,3632 10.10.10.3
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Host discovery disabled &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;-Pn&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;. All addresses will be marked &lt;span class=&#34;s1&#34;&gt;&amp;#39;up&amp;#39;&lt;/span&gt; and scan &lt;span class=&#34;nb&#34;&gt;times&lt;/span&gt; will be slower.
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Starting Nmap 7.91 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt; https://nmap.org &lt;span class=&#34;o&#34;&gt;)&lt;/span&gt; at 2021-08-28 21:12 EDT
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Nmap scan report &lt;span class=&#34;k&#34;&gt;for&lt;/span&gt; 10.10.10.3
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Host is up &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;0.12s latency&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;.
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;PORT     STATE SERVICE     VERSION
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;21/tcp   open  ftp         vsftpd 2.3.4
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_ftp-anon: Anonymous FTP login allowed &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;FTP code 230&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; ftp-syst: 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;   STAT: 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; FTP server status:
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;      Connected to 10.10.14.2
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;      Logged in as ftp
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;      TYPE: ASCII
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;      No session bandwidth limit
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;      Session timeout in seconds is &lt;span class=&#34;m&#34;&gt;300&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;      Control connection is plain text
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;      Data connections will be plain text
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;      vsFTPd 2.3.4 - secure, fast, stable
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_End of status
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;22/tcp   open  ssh         OpenSSH 4.7p1 Debian 8ubuntu1 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;protocol 2.0&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; ssh-hostkey: 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;   &lt;span class=&#34;m&#34;&gt;1024&lt;/span&gt; 60:0f:cf:e1:c0:5f:6a:74:d6:90:24:fa:c4:d5:6c:cd &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;DSA&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_  &lt;span class=&#34;m&#34;&gt;2048&lt;/span&gt; 56:56:24:0f:21:1d:de:a7:2b:ae:61:b1:24:3d:e8:f3 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;RSA&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;139/tcp  open  netbios-ssn Samba smbd 3.X - 4.X &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;workgroup: WORKGROUP&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;445/tcp  open  netbios-ssn Samba smbd 3.0.20-Debian &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;workgroup: WORKGROUP&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;3632/tcp open  distccd     distccd v1 &lt;span class=&#34;o&#34;&gt;((&lt;/span&gt;GNU&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt; 4.2.4 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;Ubuntu 4.2.4-1ubuntu4&lt;span class=&#34;o&#34;&gt;))&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Service Info: OSs: Unix, Linux&lt;span class=&#34;p&#34;&gt;;&lt;/span&gt; CPE: cpe:/o:linux:linux_kernel
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id=&#34;identificación-de-vulnerabilidades&#34;&gt;Identificación de vulnerabilidades&lt;/h2&gt;
&lt;p&gt;Como podemos observar, en el puerto 445 corre la version 3.0.20 de samba, entonces hacemos una búsqueda en searchsploit con el comando searchsploit samba 3.0.20.&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackTheBox Blue</title>
      <link>https://blog.s4yhii.com/posts/2021-08-28-blue-htb/</link>
      <pubDate>Sat, 28 Aug 2021 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2021-08-28-blue-htb/</guid>
      <description>&lt;h2 id=&#34;enumeración&#34;&gt;Enumeración&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;System IP: 10.10.10.40&lt;/strong&gt;&lt;/p&gt;
&lt;h3 id=&#34;matriz-de-la-maquina&#34;&gt;Matriz de la maquina&lt;/h3&gt;
&lt;p&gt;Esta matriz nos muestra las características de explotación de la maquina.&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;Matriz de la maquina&#34; loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/htb/blue/matrix.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Enumeración de servicios&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The service enumeration portion of a penetration test focuses on gathering information about what services are alive on a system or systems.
This is valuable for an attacker as it provides detailed information on potential attack vectors into a system.
Understanding what applications are running on the system gives an attacker needed information before performing the actual penetration test.
In some cases, some ports may not be listed.&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackTheBox Knife</title>
      <link>https://blog.s4yhii.com/posts/2021-08-28-knife-htb/</link>
      <pubDate>Sat, 28 Aug 2021 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2021-08-28-knife-htb/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Machine IP&lt;/strong&gt;: 10.10.10.242&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;DATE&lt;/strong&gt;  : 28/08/2021&lt;/p&gt;
&lt;h2 id=&#34;matriz-de-la-maquina&#34;&gt;Matriz de la maquina&lt;/h2&gt;
&lt;p&gt;Esta matriz nos muestra las características de explotación de la maquina.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/htb/knife/matrix.png&#34;&gt;&lt;/p&gt;
&lt;h2 id=&#34;reconocimiento&#34;&gt;Reconocimiento&lt;/h2&gt;
&lt;p&gt;Primero hacemos un escaneo de puertos para saber cuales están abiertos y conocer sus servicios correspondientes&lt;/p&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-console&#34; data-lang=&#34;console&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;┌──(j3sm0n㉿kali)-[~]
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;└─$ nmap -sC -sV 10.10.10.242                                                                 148 ⨯ 1 ⚙
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;Starting Nmap 7.91 ( https://nmap.org ) at 2021-06-07 02:03 EDT
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;Nmap scan report for 10.10.10.242
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;Host is up (0.11s latency).
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;Not shown: 998 closed ports
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;PORT   STATE SERVICE VERSION
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;22/tcp open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.2 (Ubuntu Linux; protocol 2.0)
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;| ssh-hostkey: 
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;|   3072 be:54:9c:a3:67:c3:15:c3:64:71:7f:6a:53:4a:4c:21 (RSA)
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;|   256 bf:8a:3f:d4:06:e9:2e:87:4e:c9:7e:ab:22:0e:c0:ee (ECDSA)
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;|_  256 1a:de:a1:cc:37:ce:53:bb:1b:fb:2b:0b:ad:b3:f6:84 (ED25519)
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;80/tcp open  http    Apache httpd 2.4.41 ((Ubuntu))
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;|_http-server-header: Apache/2.4.41 (Ubuntu)
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;|_http-title:  Emergent Medical Idea
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;err&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;Nmap done: 1 IP address (1 host up) scanned in 23.02 seconds
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Como vemos tiene el puerto 80 abierto, que es el http,  veremos en el navegador de que se trata y analizaremos la web&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackTheBox Writeup</title>
      <link>https://blog.s4yhii.com/posts/2021-07-25-writeup-htb/</link>
      <pubDate>Sun, 25 Jul 2021 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2021-07-25-writeup-htb/</guid>
      <description>&lt;hr&gt;
&lt;p&gt;&lt;strong&gt;Machine IP&lt;/strong&gt; : 10.10.10.138&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;DATE&lt;/strong&gt;  : 25/07/2021&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;matriz-de-la-maquina&#34;&gt;Matriz de la maquina&lt;/h2&gt;
&lt;p&gt;Esta matriz nos muestra las características de explotación de la maquina.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/htb/writeup/matrix.png&#34;&gt;&lt;/p&gt;
&lt;h2 id=&#34;reconocimiento&#34;&gt;Reconocimiento&lt;/h2&gt;
&lt;p&gt;Primero hacemos un escaneo de puertos para saber cuales están abiertos y conocer sus servicios correspondientes.&lt;/p&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;p&gt;Usamos el siguiente comando para escanear todos los puertos de una manera rapida.&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;nmap -p- --open -T5 -v -n -Pn 10.10.10.138
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Posteriormente utilizamos este comando con los puertos del anterior escaneo para saber las versiones de cada servicio.&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackTheBox Armageddon</title>
      <link>https://blog.s4yhii.com/posts/2021-07-24-armageddon-htb/</link>
      <pubDate>Sat, 24 Jul 2021 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2021-07-24-armageddon-htb/</guid>
      <description>&lt;hr&gt;
&lt;p&gt;&lt;strong&gt;Machine IP&lt;/strong&gt; : 10.10.10.233&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;DATE&lt;/strong&gt;  : 24/07/2021&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;matriz-de-la-maquina&#34;&gt;Matriz de la maquina&lt;/h2&gt;
&lt;p&gt;Esta matriz nos muestra las características de explotación de la maquina.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/htb/armageddon/matrix.png&#34;&gt;&lt;/p&gt;
&lt;h2 id=&#34;reconocimiento&#34;&gt;Reconocimiento&lt;/h2&gt;
&lt;p&gt;Primero hacemos un escaneo de puertos para saber cuales están abiertos y conocer sus servicios correspondientes.&lt;/p&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;┌──&lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;s4yhii㉿kali&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;-&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;~&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;└─$ nmap -p22,80 -sC -sV -n 10.10.10.233 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Starting Nmap 7.91 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt; https://nmap.org &lt;span class=&#34;o&#34;&gt;)&lt;/span&gt; at 2021-06-16 05:46 EDT
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Nmap scan report &lt;span class=&#34;k&#34;&gt;for&lt;/span&gt; 10.10.10.233
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Host is up &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;0.11s latency&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;.
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;PORT   STATE SERVICE VERSION
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;22/tcp open  ssh     OpenSSH 7.4 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;protocol 2.0&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; ssh-hostkey: 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;   &lt;span class=&#34;m&#34;&gt;2048&lt;/span&gt; 82:c6:bb:c7:02:6a:93:bb:7c:cb:dd:9c:30:93:79:34 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;RSA&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;   &lt;span class=&#34;m&#34;&gt;256&lt;/span&gt; 3a:ca:95:30:f3:12:d7:ca:45:05:bc:c7:f1:16:bb:fc &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;ECDSA&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_  &lt;span class=&#34;m&#34;&gt;256&lt;/span&gt; 7a:d4:b3:68:79:cf:62:8a:7d:5a:61:e7:06:0f:5f:33 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;ED25519&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;80/tcp open  http    Apache httpd 2.4.6 &lt;span class=&#34;o&#34;&gt;((&lt;/span&gt;CentOS&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt; PHP/5.4.16&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_http-generator: Drupal &lt;span class=&#34;m&#34;&gt;7&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;http://drupal.org&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; http-robots.txt: &lt;span class=&#34;m&#34;&gt;36&lt;/span&gt; disallowed entries &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;&lt;span class=&#34;m&#34;&gt;15&lt;/span&gt; shown&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; /includes/ /misc/ /modules/ /profiles/ /scripts/ 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; /themes/ /CHANGELOG.txt /cron.php /INSTALL.mysql.txt 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt; /INSTALL.pgsql.txt /INSTALL.sqlite.txt /install.php /INSTALL.txt 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_/LICENSE.txt /MAINTAINERS.txt
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_http-server-header: Apache/2.4.6 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;CentOS&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt; PHP/5.4.16
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;_http-title: Welcome to  Armageddon &lt;span class=&#34;p&#34;&gt;|&lt;/span&gt;  Armageddon
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Nmap &lt;span class=&#34;k&#34;&gt;done&lt;/span&gt;: &lt;span class=&#34;m&#34;&gt;1&lt;/span&gt; IP address &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;&lt;span class=&#34;m&#34;&gt;1&lt;/span&gt; host up&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt; scanned in 12.12 seconds
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Como podemos obervar tenemos 2 puertos abiertos, el 80 con el servicio http y el 22 ssh, como vemos cuenta con el archivo robots.txt y otros más interesantes, procederemos a inspeccionar en la web.&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackTheBox Shocker</title>
      <link>https://blog.s4yhii.com/posts/2021-07-18-shocker-htb/</link>
      <pubDate>Sun, 18 Jul 2021 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2021-07-18-shocker-htb/</guid>
      <description>&lt;hr&gt;
&lt;p&gt;&lt;strong&gt;Machine IP&lt;/strong&gt; : 10.10.10.56&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;DATE&lt;/strong&gt;  : 18/07/2021&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;matriz-de-la-maquina&#34;&gt;Matriz de la maquina&lt;/h2&gt;
&lt;p&gt;Esta matriz nos muestra las características de explotación de la maquina.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/htb/shocker/matrix.png&#34;&gt;&lt;/p&gt;
&lt;h2 id=&#34;reconocimiento&#34;&gt;Reconocimiento&lt;/h2&gt;
&lt;p&gt;Primero hacemos un escaneo de puertos para saber cuales están abiertos y conocer sus servicios correspondientes.&lt;/p&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;p&gt;Usamos el siguiente comando para escanear todos los puertos de una manera rapida.&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;nmap -p- --open -T5 -v -n -Pn 10.10.10.56
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Posteriormente utilizamos este comando con los puertos del anterior escaneo para saber las versiones de cada servicio.&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackTheBox Traverxec</title>
      <link>https://blog.s4yhii.com/posts/2021-07-08-traverxec-htb/</link>
      <pubDate>Thu, 08 Jul 2021 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2021-07-08-traverxec-htb/</guid>
      <description>&lt;hr&gt;
&lt;p&gt;&lt;strong&gt;Machine IP&lt;/strong&gt; : 10.10.10.165&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;DATE&lt;/strong&gt;  : 08/07/2021&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;matriz-de-la-maquina&#34;&gt;Matriz de la maquina&lt;/h2&gt;
&lt;p&gt;Esta matriz nos muestra las características de explotación de la maquina.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/htb/traverxec/matrix.png&#34;&gt;&lt;/p&gt;
&lt;h2 id=&#34;reconocimiento&#34;&gt;Reconocimiento&lt;/h2&gt;
&lt;p&gt;Primero hacemos un escaneo de puertos para saber cuales están abiertos y conocer sus servicios correspondientes.&lt;/p&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;p&gt;Usamos el siguiente comando para escanear todos los puertos de una manera rapida.&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;nmap -p- --open -T5 -v -n -Pn 10.10.10.165
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Posteriormente utilizamos este comando con los puertos del anterior escaneo para saber las versiones de cada servicio.&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackTheBox ScriptKiddie</title>
      <link>https://blog.s4yhii.com/posts/2021-06-16-scriptkiddie-htb/</link>
      <pubDate>Wed, 16 Jun 2021 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2021-06-16-scriptkiddie-htb/</guid>
      <description>&lt;hr&gt;
&lt;p&gt;&lt;strong&gt;Machine IP&lt;/strong&gt;: 10.10.10.226&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;DATE&lt;/strong&gt;  : 16/06/2021&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;reconocimiento&#34;&gt;Reconocimiento&lt;/h2&gt;
&lt;p&gt;Primero hacemos un escaneo de puertos para saber cuales están abiertos y conocer sus servicios correspondientes.&lt;/p&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;┌──&lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;s4yhii㉿kali&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;-&lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;~&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;└─$ nmap -p- --open -T5 -v -n 10.10.10.226                 
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Starting Nmap 7.91 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt; https://nmap.org &lt;span class=&#34;o&#34;&gt;)&lt;/span&gt; at 2021-06-15 20:45 EDT
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Initiating Ping Scan at 20:45
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Scanning 10.10.10.226 &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;&lt;span class=&#34;m&#34;&gt;2&lt;/span&gt; ports&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Completed Ping Scan at 20:45, 0.12s elapsed &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;&lt;span class=&#34;m&#34;&gt;1&lt;/span&gt; total hosts&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Initiating Connect Scan at 20:45
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Scanning 10.10.10.226 &lt;span class=&#34;o&#34;&gt;[&lt;/span&gt;&lt;span class=&#34;m&#34;&gt;65535&lt;/span&gt; ports&lt;span class=&#34;o&#34;&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Discovered open port 22/tcp on 10.10.10.226
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Stats: 0:00:20 elapsed&lt;span class=&#34;p&#34;&gt;;&lt;/span&gt; &lt;span class=&#34;m&#34;&gt;0&lt;/span&gt; hosts completed &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;&lt;span class=&#34;m&#34;&gt;1&lt;/span&gt; up&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;, &lt;span class=&#34;m&#34;&gt;1&lt;/span&gt; undergoing Connect Scan
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Connect Scan Timing: About 29.62% &lt;span class=&#34;k&#34;&gt;done&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;;&lt;/span&gt; ETC: 20:46 &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;0:00:48 remaining&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Discovered open port 5000/tcp on 10.10.10.226
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Completed Connect Scan at 20:46, 60.38s elapsed &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;&lt;span class=&#34;m&#34;&gt;65535&lt;/span&gt; total ports&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Nmap scan report &lt;span class=&#34;k&#34;&gt;for&lt;/span&gt; 10.10.10.226
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Host is up &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;0.12s latency&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt;.
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Not shown: &lt;span class=&#34;m&#34;&gt;52711&lt;/span&gt; closed ports, &lt;span class=&#34;m&#34;&gt;12822&lt;/span&gt; filtered ports
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;PORT     STATE SERVICE
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;22/tcp   open  ssh
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;5000/tcp open  upnp
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Read data files from: /usr/bin/../share/nmap
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;Nmap &lt;span class=&#34;k&#34;&gt;done&lt;/span&gt;: &lt;span class=&#34;m&#34;&gt;1&lt;/span&gt; IP address &lt;span class=&#34;o&#34;&gt;(&lt;/span&gt;&lt;span class=&#34;m&#34;&gt;1&lt;/span&gt; host up&lt;span class=&#34;o&#34;&gt;)&lt;/span&gt; scanned in 60.62 seconds
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Como vemos tiene 2 puertos abiertos el &lt;code&gt;22&lt;/code&gt; y el &lt;code&gt;5000&lt;/code&gt; uno con el servicio &lt;code&gt;ssh&lt;/code&gt; y el otro con el servicio de &lt;code&gt;Plug and Play&lt;/code&gt;, que se usa para conectar impresoras, dispositivos bluetooh, etc.&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackTheBox Bashed</title>
      <link>https://blog.s4yhii.com/posts/2021-06-13-bashed-htb/</link>
      <pubDate>Sun, 13 Jun 2021 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2021-06-13-bashed-htb/</guid>
      <description>&lt;hr&gt;
&lt;p&gt;&lt;strong&gt;Machine IP&lt;/strong&gt;: 10.10.10.68&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;DATE&lt;/strong&gt;  : 13/06/2021&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;reconocimiento&#34;&gt;Reconocimiento&lt;/h2&gt;
&lt;p&gt;Primero hacemos un escaneo de puertos para saber cuales están abiertos y conocer sus servicios correspondientes.&lt;/p&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/htb/bashed/nmap.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;Como vemos solo el puerto 80 está abierto, así que investigaremos en la web para ver si encontramos algo interesante&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/htb/bashed/web.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;En la web no encontré nada :,c, pero &lt;code&gt;phpbash&lt;/code&gt; me da una pista.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/htb/bashed/phpbash.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;Como vemos es un frontend normal,pero el nombre &lt;code&gt;php bash&lt;/code&gt; es algo sospechoso  al parecer no muestra directorios, por eso le hacemos un &lt;code&gt;brute force&lt;/code&gt; para enumerar los directorios con &lt;code&gt;gobuster&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
