Powershell * WMI

Classes Remove an Object

WMI returns live, editable objects so place be careful while removing on object: PS C:\Windows\system32> Get-WmiObject -Class win32_process | where-object {$_.Name -eq “notepad.exe”} | Remove-WmiObject PS C:\Windows\system32> Get-CimInstance -ClassName win32_process -Filter “Name = ‘notepad.exe’” | remove-ciminstance PS C:\Windows\system32> Get-WmiObject -class win32_process -filter ‘Name = “calculator.exe”‘ PS C:\Windows\system32> Get-WmiObject -class win32_process –list Exploring Methods: Find all […]

HACKTHEBOX * Vulnerable Machine Writeup

SAFE (HACKTHEBOX)

root@kali:~/Downloads# masscan -e tun0 -p1-65535,U:1-65535 10.10.10.147 –rate=1000 Starting masscan 1.0.5 (http://bit.ly/14GZzcT) at 2019-10-28 04:48:17 GMT— forced options: -sS -Pn -n –randomize-hosts -v –send-ethInitiating SYN Stealth ScanScanning 1 hosts [131070 ports/host]Discovered open port 1337/tcp on 10.10.10.147 Discovered open port 22/tcp on 10.10.10.147 Discovered open port 80/tcp on 10.10.10.147 ^Zte: 0.00-kpps, 100.00% done, waiting -13-secs, found=3 [2]+ […]

Vulnerable Machine Writeup * VULNHUB

SILKY-CTF 0x01 (VULNHUB)

LINK: https://download.vulnhub.com/silky/Silky-CTF_0x01.ova root@kali:~# netdiscover -i eth0 Currently scanning: 192.168.118.0/16 | Screen View: Unique Hosts 7 Captured ARP Req/Rep packets, from 3 hosts. Total size: 420 _____________________________________________________________________________ IP At MAC Address Count Len MAC Vendor / Hostname —————————————————————————– 192.168.222.2 00:50:56:ea:c4:b4 4 240 VMware, Inc. 192.168.222.141 00:0c:29:6f:21:8c 2 120 VMware, Inc. 192.168.222.254 00:50:56:ec:ed:df 1 60 VMware, Inc. […]

Vulnerable Machine Writeup * VULNHUB

HA NARUTO (VULNHUB)

LINK: https://drive.google.com/file/d/1RK6ZdBstyw886OmpExUItK4_soMLMUxD/view?usp=sharing root@kali:~/.ssh# nmap -A 192.168.222.152 Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-28 08:18 GMT Nmap scan report for 192.168.222.152 Host is up (0.00017s latency). Not shown: 996 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 2048 dc:8d:8b:ee:53:c1:b1:86:9a:a8:fd:2a:af:82:bd:24 (RSA) | 256 e6:86:b7:62:d8:de:17:8e:df:df:ec:43:42:74:e5:21 […]