Ah, good old laziness comes in various forms and flavors. Hey, they even included sloth in deadly sins list. For a reason I might say. Today we’ll look at our typical IT sinner – the lazy sysadmin.
Author: belowzero273
Lab – Game of Thrones
TV show is finally over.
It’s hard to imagine now, that series premiered back in 2011 and lasted over 8 season. Show was praised by critics and fans alike, generated tons a memes and fan theories. It doesn’t matter that last episode is lowest-ranked episode ever on IMDB. Ever! I can’t agree with this, but it doesn’t matter now. I’m thankful for these 8 years anyway.
I found this CTF machine made by OscarAkaElvis on vulnhub. It’s clearly inspired by Game of Thrones, but goes way beyond it . So, valar morghulis!
Lab – Raven 2
This Friday lab is dedicated to one my favorite writers. But it’s just a coincidence =) #cissp #security #pentest
Raven 2 is another vulnerable intermediate level machine by William McCann. The only difference here that it has four flags to capture. Let’s dive right in!
Lab – Matrix
The Matrix has you! Another quite easy machine to take down this monday. It’s more suitable as CTF, not a real life example, but however it’s really entertaining.
Lab – Stapler – part 2
We did everything we could with the machine last time, why go back there? The thing is that sometimes there’s more than one solution for a single task.
This time we’ll try a different approach and see how it goes.
Lab – Stapler – part 1
Let’s move on to this labs. This time is a Stapler by a g0tmi1k. Yeah, “You see Bob, it’s not that I’m lazy, it’s that I just don’t care”
Stapler is an intermediate machine with a couple of interesting twists. Here we go.
Lab – Toppo
My pick for the first blog is a Toppo by Hadi Mene. Yes, I know there are many write ups but there’s no reason not make my own one!
Toppo is an entry level machine, but we have to start somewhere, right?
Thomas was alone
Well, not him. In fact it was me, alone in my boredom. (But check the game about Thomas, it’s a life changing experience).
Then I realized, that it was more than a year that I haven’t studied anything new or even remotely exciting. How come? Good old routine. And a lack of practice doesn’t make anyone better. Plus I have a lot of CPE to grab and blogging is an easy way.
In the following articles I’ll get a random machine from vulnhub.com and describe a process of hacking it. I’ll start from easy ones to see how things are going and then will get to more advanced boxes.
Акула в сети
Один из моих любимых игровых трейлеров начинается примерно так: «Когда-то давно древние ацтеки верили, что боги не просто подарили людям жизнь, но её пришлось украсть. Прометей украл огонь, а Альберих стащил кольцо».
Я ни на что не намекаю, но история эта стара как мир, и поговорим мы сегодня про воровство. А воровать мы будем сетевой трафик. И, конечно же, не воровать, а перехватывать =)
Shark on a wire
One of my favorite game trailers starts with something like this: “Once upon a time Aztecs believed that the gods did not just gave life to the people, but it had to be stolen. Prometheus stole the eternal flame, and Alberich stole the ring”.
I’m not implying anything, but the story is as old as the world itself and we’ll talk about stealing today. We’re going to steal some network traffic. And, of course, it’s not stealing it’s intercepting =)