<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Nithin R on Medium]]></title>
        <description><![CDATA[Stories by Nithin R on Medium]]></description>
        <link>https://medium.com/@thebinarybot?source=rss-b28e3e1c3f63------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/1*6-fw5hgTp6wmuH_GUxdKaQ.jpeg</url>
            <title>Stories by Nithin R on Medium</title>
            <link>https://medium.com/@thebinarybot?source=rss-b28e3e1c3f63------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Thu, 14 May 2026 14:19:19 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@thebinarybot/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Thebinarybot’s Guide to Shells ❤]]></title>
            <link>https://infosecwriteups.com/thebinarybots-guide-to-shells-3acc78c59b6f?source=rss-b28e3e1c3f63------2</link>
            <guid isPermaLink="false">https://medium.com/p/3acc78c59b6f</guid>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[computer-science]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[ethical-hacking]]></category>
            <category><![CDATA[penetration-testing]]></category>
            <dc:creator><![CDATA[Nithin R]]></dc:creator>
            <pubDate>Mon, 08 Jul 2024 13:45:19 GMT</pubDate>
            <atom:updated>2024-07-08T17:58:53.901Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Zu7Uoum9t1syzqMcTgC1Iw.png" /></figure><h4>whoami</h4><p>Hello, this is Nithin here. I’m a security researcher/enthusiast and I go by the handle @thebinarybot at most of the places online.</p><h4>cat whatsthisarticleabout.txt</h4><p>“I’m in” is a classic dialogue used in almost most of the techno-geek or hacker-ish films to describe that they have “hacked” into a system. But what does it actually mean? What did the hero get into?</p><p>Learn about what a shell, terminal emulator, the anatomy of a shell and a lot more in this blog.</p><h4>Introduction</h4><p>Most of the times, when the said “hacker” utters words such as “I’m in”, “We’re in the game”, “System Hacked” in movies, you would immediate see a panel with gibberish words written in it.</p><p>Something like the below image for example.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Ldw6B_Xlx05jSz4F7-LoWQ.png" /></figure><p>As a child, anything that was written in block letters and displayed in a font as shown above immediately caught my attention. I used to think hacking was all about typing some commands and “getting in” to a system. But that is definitely no it.</p><p>Cutting back to the topic, the above image you see is precisely what a shell is. It is not a hack, nor is it a technique or a super complex technical stuff that you cannot understand.</p><p>In simple terms, a shell is nothing but merely a computer program that provides the user with an interface to input instructions into the system and view text output. These inputs are said to be command-line inputs as they do not have a graphical interface and require you to type words, quite literally.</p><p>But as depicted accurately in films, for a penetration tester or a hacker, a shell is often the end result you see after successfully exploiting a vulnerability to gain interactive access to the target system.</p><p>So, in a way, a shell gives the hacker a direct access to the target operating system, thereby allowing them to run harmful commands, view the filesystem, modify data and much more.</p><h4>Terminal Emulator</h4><p>Every operating system such as Windows, Linux and MacOS has a shell and to interact with the system’s shell we use an application called as the Terminal or Terminal Emulator.</p><p>Few noteworthy Terminal Enumerators for popular operating systems include:</p><p>Windows Terminal — Windows</p><p>GNOME, MATE Terminal — Linux</p><p>Terminal, iTerm2 — MacOS</p><p>There are many more terminals available out there and in fact it is possible to install a terminal emulator on different operating systems if it’s open-sourced and supports the platform. However, these are merely personal preferences.</p><h4>CLI — Command Language Interpreter</h4><p>A Command Language Interpreter (CLI) is a software program that interprets and executes commands entered by a user or provided by scripts. These commands typically interact with the operating system or perform various tasks.</p><p>Hence, every time we talk about command-line interfaces we should understand that it’s a combination of the OS, terminal emulator application and the command language interpreter.</p><p>There are many command language interpreters, also often called as shell scripting languages or command scripting languages.</p><h4>Shell Variants</h4><p>As we understood that shell is merely a computer program which passes messages to the system, we should also understand there are many variants and types of this program. One should not confuse these types with that of the types of terminal emulators available. Both are different.</p><blockquote>But how are they different? What is the difference between a terminal emulator and a shell?</blockquote><p>To rephrase, <strong>a terminal emulator</strong> is merely a software application that emulates a video terminal within another display architecture. It allows users to interact with the system’s shell or command-line interface in a graphical environment. Essentially, it provides the window or interface where you type and execute commands.</p><p>However, <strong>a shell</strong> is a command-line interpreter that provides a user interface for accessing the operating system’s services. It interprets and executes the commands entered by the user or read from a script. The shell is responsible for running commands, managing processes, and providing programming constructs like loops and conditionals.</p><p>Now, coming back to the different types of shells — we should understand that these different types of shells are not simply graphically different as that of terminal emulator and they carry actual different in properties, functions and features. Here’s a couple of them:</p><ol><li>The Bourne Shell (sh): Bourne Shell is regarded as the first UNIX shell ever. sh is super compact and also had a huge speed of operation. Moreover, scripts written for Bourne shell are portable across Unix-like systems. However, It doesn’t have in-built functionality to handle logical and arithmetic operations. Furthermore, the Bourne shell cannot recall previously used commands.</li><li>The GNU Bourne-Again Shell (bash): bash is an enhanced version of sh, as the name suggests, with more features incorporated from other shells such as csh, ksh etc. For example, bash allows us to automatically recall previously used commands and edit them with help of arrow keys. This is not possible in sh. However, as it has these extra features it is slightly more resource-intensive than simpler shells.</li><li>Z Shell (zsh): zsh is a modern shell used by many professionals today. It is known for its robust interactive features, scripting capabilities, and extensive customization options. With zsh, you can have customized themes, enable auto-completion, do globbing and much more.</li></ol><p>Now let us see how to identify the terminal and shell/command language interpreter we have practically.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*GOEwUijnhmn3OkLi2sVLmA.png" /></figure><p>Although there are many ways to do this, you can easily figure out what shell you are running using the command <strong>echo $SHELL</strong> and what terminal emulator you have using <strong>echo $TERM</strong>.</p><h4>Types of Shells</h4><p>As discussed earlier, as penetration tester or an ethical hacker you have compromised a system to it’s fullest if you’re able to interact with it remotely — thereby accessing the shell.</p><p>To do this, there are different ways. For example, you can connect to a compromised system through network protocols like SSH or WinRM which allows remote login. But these usually require credentials.</p><p>To get a remote shell without having credentials is quite hard but still possible. This method is known as remote code execution. To achieve this, we must first learn the different type of shells:</p><ol><li><strong>Reverse Shell:</strong> A reverse shell is a type of shell where the target machine initiates the connection to the attacker’s machine. This is a commonly used attack technique to bypass firewall rules and network address translation (NAT) that might block incoming connections but allow outgoing connections. This is one of the most quickest and easiest method to obtain control over a compromised host.</li><li><strong>Bind Shell:</strong> A bind shell is a type of shell that listens on a specific port on the target machine, waiting for an incoming connection from the attacker’s machine. Once the connection is made, the attacker gains control over the target system. Unlike a reverse shell which connects to us (attacker machine), we intend to connect to the target machine machine’s listening port.</li></ol><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Zu7Uoum9t1syzqMcTgC1Iw.png" /></figure><p>To understand more about the workings of Reverse/Bind Shell, the commands used to establish these shells across different OS variants, I strongly urge you to checkout my guide: <a href="https://thebinarybot.gumroad.com/l/shellsexplained">https://thebinarybot.gumroad.com/l/shellsexplained</a></p><p>The entire guide contains much more information as compared to this blog. You will also get to learn more about tools used to setup shells, how to stabilize shells and also learn about additional shell types such as web shells. All of this knowledge is for just $2.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*HMoQOh944z72LEAxmh1GwQ.png" /><figcaption>A small sneak peak — 1</figcaption></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*VW5FAbw4bjEnCI100Bl8nQ.png" /><figcaption>A small sneak peak — 2</figcaption></figure><h4>Support</h4><p>I have been creating content related to Cybersecurity/Bug Bounty Hunting for a while now. Although not necessary, it would mean the world to me if you decide to support me by <strong>buying me a book</strong> <a href="https://www.buymeacoffee.com/thebinarybot">here</a>.</p><p>This would not just help me but also the community as I will be able to create more quality content the more I read.</p><p>Kindly share this post with your friends who could benefit and please clap too!</p><h4>Contact</h4><p>Twitter: <a href="https://x.com/thebinarybot">https://x.com/thebinarybot</a><br>Discord: thebinarybot</p><p>Cheers 🍻</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=3acc78c59b6f" width="1" height="1" alt=""><hr><p><a href="https://infosecwriteups.com/thebinarybots-guide-to-shells-3acc78c59b6f">Thebinarybot’s Guide to Shells ❤</a> was originally published in <a href="https://infosecwriteups.com">InfoSec Write-ups</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Bug Bounty / Cybersecurity Resource Management Guide]]></title>
            <link>https://thebinarybot.medium.com/bug-bounty-cybersecurity-resource-management-guide-ef415b7052ed?source=rss-b28e3e1c3f63------2</link>
            <guid isPermaLink="false">https://medium.com/p/ef415b7052ed</guid>
            <category><![CDATA[management]]></category>
            <category><![CDATA[information-security]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <dc:creator><![CDATA[Nithin R]]></dc:creator>
            <pubDate>Wed, 02 Nov 2022 13:36:35 GMT</pubDate>
            <atom:updated>2022-11-02T13:36:35.166Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*zyLFBBvTLdmwmfhzB6d9Hw.png" /></figure><h4>whoami</h4><p>Hello, this is Nithin here. I’m a security researcher / enthusiast and I go by the handle <a href="https://hacklido.com/u/thebinarybot">@thebinarybot</a> at most of the places online.</p><h4>cat whatsthisarticleabout.txt</h4><p>One of the most underrated and often ignored skill in bug bounty is to manage all your resources. This includes everything from having a close eye on your target, taking notes and keeping yourself up-to date with whatever is happening in the community. In this article, I aspire to share with you the common tools and strategies I use to manage my resources when it comes to bug bounties.</p><h4>1. Community</h4><blockquote><em>Twitter is a gamechanger and TweetDeck is Twitter on steroids.</em></blockquote><p>Back when I started in bug bounties I didn’t know and understand the importance of community. I never used to ask for help. Maybe one of the reasons for that was because I was shy of what others would think of me. But since joining Twitter, my idea on how it all works has changed. I received input from strangers, exchanged ideas and also found new friends.</p><p>If not for these, Twitter is also the best place to keep an eye on the target you’re testing. Given that almost every organization has a Twitter account and tweet their updates and newly released features, you should consider following your target organization and lookout for freshly populated areas to attack.</p><p>Coming to TweetDeck, I wasn’t lying when I said TweetDeck is Twitter on steroids. It quite feels that way because TweetDeck lets you monitor multiple tags, users, organizations etc. in one single page.</p><p>I personally like to keep an eye on my target, newly released cves and a couple of popular bug bounty tags such as #bugbounty &amp; #bugbountytips all in one page using TweetDeck.</p><p>I would also strongly suggest you to use Discord and be a part of major discord servers such as NahamSec’s server, HackerOne, BugCrowd, TryHackMe and HackTheBox. Be a part of whatever interests you.</p><h4>2. Note Taking</h4><p>I have stressed the importance of note taking a lot of times and I do so once again here.</p><p>Note taking is painful but extremely important. I’ve always found it hard to start but once I start everything just falls along. So the obvious question is what note taking application do I use?</p><p>To me, it’s a mixture of tools for different purposes once again. I do not have one all purpose tool and don’t think I ever will. So, here’s a list of tools I use and how I use them.</p><ul><li>Notion: I primarily use Notion as my knowledge bank. Any time I learn something new, I like to take notes and keep it updated in Notion. This includes conference notes, deep dive vulnerability analysis and much more. It is also super helpful to me as a creator as sometimes I would feel like giving out some of my notes and templates to the community.</li><li>One Note: If you think One Note is dead, I feel for you. One Note has been my light weight go-to application to just randomly jot down everything I am testing and I have to test after choosing a target. I have a notebook named BugBountyTargets and every section in this notebook belongs to a target I am testing. I segregate a section into different pages such as recon intel, interesting endpoints and much more.</li><li>XMind: XMind is another brilliant tool that has worked magic. All of my extensive notes go on One Note and all of my lightweight testing strategies fall into X Mind. I create mind maps to have a large scale picture of my target and the items I would like to test.</li></ul><h4>3. RSS Feeds</h4><p>Keeping updated with the things that’s happening is crucial if you’ve chosen Cybersecurity. You always have to keep yourself updated and one way to do that effectively is by reading blogs and writeups. You can take the pain and check each popular blog one by one or you can be smart by pulling all the RSS feeds of your favourite blogs and read them all at one place. That one place for me is an app called “Inoreader”. I chose this app as it works the best for me but you can do a quick google and play around different RSS Feed Apps before settling into one.</p><p>I recently wrote a thread on my favourite blogs to keep oneself updated. You can find it <a href="https://twitter.com/thebinarybot/status/1586215065719656448">here</a>.</p><h4>4. Books</h4><p>Books have helped me widen my knowledge and shape my perspectives. I read a wide variety of books such as fiction, travelogues, self-help, technical etc. And obviously once again, the challenge is to keep them all in one place and also make sure that it is possible to quickly retrieve any information that I need. I recently started using Apple Books to tackle this issue as it helps me easily annotate and lookup and information I need. But it is understandable if you don’t know Apple. Prior to Apple Books, I was using this app called SumatraPDF in windows. This app is super lightweight and helps you to annotate and organize easily. Would highly recommend you to use this.</p><p>If you are looking for books to read in context to bug bounty, find my thread on the same <a href="https://twitter.com/thebinarybot/status/1554884842999136257">here</a>.</p><h4>5. Newsletters</h4><p>In addition to blogposts, I also subscribe to quite a bunch of newsletters to keep myself updated. Sometimes all you need is a weekly overview of everything that’s happened in the bug bounty / infosec space and newsletters are the best for this purpose.</p><p>Wondering what newsletters to subscribe? Checkout this thread on my most favourite newsletters <a href="https://twitter.com/thebinarybot/status/1564952680547614722">here</a>.</p><h4>Bonus</h4><p>If you are a fan of watching video content, YouTube and Twitch is your place to go. <a href="https://twitter.com/thebinarybot/status/1581998758526521350">Here</a>’s a list of <a href="https://twitter.com/thebinarybot/status/1581998758526521350">50 YouTube channels</a> you can follow to upskill in Cybersecurity / Bug Bounty.</p><p>Ideally, I would create a Notion database to keep track of all the videos I watch as well and take notes simultaneously.</p><h3>Support</h3><p>I have been creating content related to Cybersecurity / Bug Bounty Hunting for a while now. Although not necessary, it would mean the world to me if you decide to support me by <strong>buying me a book</strong> <a href="https://www.buymeacoffee.com/thebinarybot">here</a>.</p><p>This would not just help me but also the community as I will be able to create more quality content the more I read.</p><p>Cheers ;”)</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=ef415b7052ed" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[3 DOs and DON’Ts when starting in Bug Bounty]]></title>
            <link>https://thebinarybot.medium.com/3-dos-and-donts-when-starting-in-bug-bounty-cbdf3e74b7de?source=rss-b28e3e1c3f63------2</link>
            <guid isPermaLink="false">https://medium.com/p/cbdf3e74b7de</guid>
            <dc:creator><![CDATA[Nithin R]]></dc:creator>
            <pubDate>Sat, 29 Oct 2022 09:29:25 GMT</pubDate>
            <atom:updated>2022-10-29T09:29:25.217Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*wCWd-CLB5dPbXbBURmiZVQ.png" /></figure><h3>whoami</h3><p>Hello, this is Nithin here. I’m a security researcher / enthusiast and I go by the handle <a href="https://twitter.com/thebinarybot">@thebinarybot</a> at most of the places online.</p><h3>cat whatsthisarticleabout.txt</h3><p>In this article, I’m going to cover the DOs and DON’Ts when starting in Bug Bounty. As the title hints, this article is aimed for beginners who’re just venturing into this field.</p><h4>DOs</h4><ol><li>When it comes to bug bounties, you would mostly start with web application hacking to earn $$$$. Given that you’re starting with web application hacking, it is highly expected from you to know the basics of how web application and internet functions to make the most out of your hacking journey. Of course, you can just use payloads crafted by others and just spray them on all parameters but that’s not going to do any good in the long-term let alone short. If you ask me where I can learn the basics, I would shamelessly ask you to visit my blog where I have covered almost everything you need to know before getting started. Checkout the basics <a href="https://security.thebotsite.me/bug-bounty-hunting/basics">here.</a></li><li>Now that you know the basics, you need to have a wider understanding of how everything connects together. Loosely speaking, it is actually okay if you just know OWASP Top 10 and choose an easy to hunt vulnerability like IDOR or Auth Vulnerabilities. But if you just look for one type of vulnerability you might miss out on others that still exist. Ideally, it is best to develop a hacker mindset and question the platform you’re hunting. If there’s a profile picture upload functionality, ask yourself what’s going to happen if I upload anything else but a picture. Ask yourself if others can see my profile picture despite the visibility being set to private. Basically, ask yourself a lot of questions and experiment a lot. This way, you’ll develop a mindset on the entire application you’re testing which will definitely help you in the long run.</li><li>Okay, now that we got all knowledge required, we need to understand what platform can be chosen to hunt. When starting, I was under the impression that a small scope program would not have a lot of people testing and that I can find bugs. But that’s a big misconception. If you wish to know how to choose a proper program to hunt, click <a href="https://twitter.com/thebinarybot/status/1559171143390695424">here.</a></li></ol><h4>DON’Ts</h4><ol><li>Do not ever report a finding from scanner without verifying and proving an impact. Copy pasting scanner texts will irritate the triager and is definitely not something you’d get away with.</li><li>Do not spray and pray rather spray at the prey. What I mean to say is, don’t just blindly do things because anything can be vulnerable. It is true, anything can be vulnerable but if you choose your prey (ie. a weak spot such as a oddly named parameter, a seemingly insecure endpoint etc.) and hunt on it, then your chances to get that first bounty is huge,</li><li>Do not expect reward for every report that you submit. I have this mindset where I assume that 99%, this report is going to be a duplicate and I won’t make anything. This is a counter-intuitive process to make me hack more and not just sit and wait for the triage to respond on my report status.</li></ol><h3>Support</h3><p>I have been creating content related to Cybersecurity / Bug Bounty Hunting for a while now. Although not necessary, it would mean the world to me if you decide to support me by buying me a book <a href="https://www.buymeacoffee.com/thebinarybot">here</a>. This would not just help me but also the community as I will be able to create more quality content the more I read.</p><p>Cheers ;”)</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=cbdf3e74b7de" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[TryHackMe — Steel Mountain | CTF | Beginner Friendly Walkthrough]]></title>
            <link>https://thebinarybot.medium.com/tryhackme-steel-mountain-ctf-beginner-friendly-walkthrough-745497d29cf5?source=rss-b28e3e1c3f63------2</link>
            <guid isPermaLink="false">https://medium.com/p/745497d29cf5</guid>
            <category><![CDATA[ctf]]></category>
            <category><![CDATA[tryhackme]]></category>
            <category><![CDATA[tryhackme-writeup]]></category>
            <category><![CDATA[tryhackme-walkthrough]]></category>
            <category><![CDATA[ctf-writeup]]></category>
            <dc:creator><![CDATA[Nithin R]]></dc:creator>
            <pubDate>Fri, 06 Aug 2021 11:06:27 GMT</pubDate>
            <atom:updated>2021-08-06T11:06:27.053Z</atom:updated>
            <content:encoded><![CDATA[<h3>TryHackMe — Steel Mountain | CTF | Beginner Friendly Walkthrough</h3><p>Hello, this is Nithin here. I’m a security researcher / enthusiast and I go by the handle @thebinarybot at most of the places online.</p><p>Steel Mountain is a CTF at TryHackMe which is based on the popular TV series Mr.Robot and is a Windows themed room. It’s quite an easy CTF and here’s a write-up on how I solved this.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/300/0*AgfQh8CQ6jSIl0MW.jpeg" /></figure><ol><li><strong>Deploy the Machine</strong></li></ol><p>Q1. Who is the employee of the month?</p><p>First, let’s do a basic Nmap scan.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*s7lmRkJgdz4XMb1h_S-xXA.png" /></figure><p>There’s quite a bunch of open ports. Upon visiting port 80, I got this.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*VR4smLXVYvuVwiSKeOT5WQ.png" /></figure><p>But the name isn’t available. So I opened the image in new tab and the name of the employee was there in the URL.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/987/1*26aMtNetDFmsYiS2UBCOog.png" /></figure><p>Ans : Bill Harper</p><p>2. <strong>Initial Access</strong></p><p>Q1. Scan the machine with nmap. What is the other port running a web server on?</p><p>Having completed the scan previously, I knew port 8080’s service is HTTP.</p><p>Ans : 8080</p><p>Q2. Take a look at the other web server. What file server is running?</p><p>Connecting to IP:8080 and hovering over the HttpFileServer link, I was able to see that it’s pointing to rejetto.com</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/948/1*nxqwbUeGMW3lwUFDFUMVyg.png" /></figure><p>Ans : Rejetto Http File Server</p><p>Q3. What is the CVE number to exploit this file server?</p><p>From the Nmap scan, I came to know that the HttpFileServer version is 2.3. Hence, looking up for the same in Exploit-DB, I got this.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/988/1*kdGQz2ZRIKxXz3GWuyL_2Q.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*P5KU9Ie1-K6G1ffHb83_NA.png" /></figure><p>Ans : 2014–6287</p><p>Q4. Use Metasploit to get an initial shell. What is the user flag?</p><p>Launching Metasploit and then searching for the CVE.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*qK2iY7W3Hex0itO84DhEpw.png" /></figure><p>Setting necessary options and running the exploit.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Pc3D3Ae2xDFiksr-4KiTGA.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/946/1*J4IqwmkKP8p_naixKmfR7A.png" /></figure><p>But upon running exploit for the first time, I wasn’t able to create a session.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1021/1*uxg340-N03hlvbHir_o5DQ.png" /></figure><p>Then I made sure to set LHOST also to the same IP as that of SRVHOST and it worked and gave me a meterpreter shell.</p><p>Checking bill’s directory,</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*rcfAHRC2SMBpKxBRhKPE_w.png" /></figure><p>Checking bill’s desktop and obtaining the flag.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/894/1*5gv6JWBIaVCXl5N6jT13qA.png" /></figure><p>Ans : b04763b6fcf51fcd7c13abc7db4fd365</p><p>3. <strong>Privilege Escalation</strong></p><p>Uploading the PowerUp.ps1 script and loading powershell,</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*DS40965U8mJzbW4voqUX3A.png" /><figcaption>Find PowerUp.ps1 script <a href="https://github.com/PowerShellMafia/PowerSploit/blob/master/Privesc/PowerUp.ps1">here</a></figcaption></figure><p>Running PowerUp.ps1,</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*LHgL_e9GPLzuxAwtaU8fJA.png" /></figure><p>Q1. Take close attention to the CanRestart option that is set to true. What is the name of the service which shows up as an <em>unquoted service path</em> vulnerability?</p><p>Ans : AdvancedSystemCareService9</p><p>Q2. What is the root flag?</p><p>Since we have a CanRestart set to True, I tried to restart the service, upload a malicious binary instead of the legitimate one and obtain root. (Could do this since the directory of the application is write-able)</p><p>Using msfvenom to create a reverse shell,</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/900/1*2-icKaiSLVRLRt8imDNcvg.png" /></figure><p>Then, I uploaded by executable.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*kCmC718Slr1-k-w1HiPBog.png" /></figure><p>Now, starting Handler as a background job.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*P1IqjDYXLBwhsf3801wp8Q.png" /></figure><p>Now, restart AdvancedSystemCareService9 using sc stop/start AdvancedSystemCare9 and then background the current session, connect to the elevated session and obtain the flag.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=745497d29cf5" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[TryHackMe — Kenobi | CTF | Beginner Friendly Walkthrough]]></title>
            <link>https://thebinarybot.medium.com/tryhackme-kenobi-ctf-beginner-friendly-walkthrough-bd8b737afb77?source=rss-b28e3e1c3f63------2</link>
            <guid isPermaLink="false">https://medium.com/p/bd8b737afb77</guid>
            <category><![CDATA[tryhackme]]></category>
            <category><![CDATA[tryhackme-walkthrough]]></category>
            <category><![CDATA[ctf-writeup]]></category>
            <category><![CDATA[tryhackme-writeup]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <dc:creator><![CDATA[Nithin R]]></dc:creator>
            <pubDate>Thu, 05 Aug 2021 19:19:04 GMT</pubDate>
            <atom:updated>2021-08-05T19:19:04.200Z</atom:updated>
            <content:encoded><![CDATA[<h3>TryHackMe — Kenobi | CTF | Beginner Friendly Walkthrough</h3><p>Hello, this is Nithin here. I’m a security researcher / enthusiast and I go by the handle @thebinarybot at most of the places online.</p><p>Kenobi is quite an easy CTF at TryHackMe. Here’s my write-up on how I solved this room.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/512/0*tSVECuNC2oKGQjpi.png" /></figure><ol><li><strong>Deploy the vulnerable machine</strong></li></ol><p>Q1. Make sure you&#39;re connected to our network and deploy the machine</p><p><em>(No answer needed)</em></p><p>Q2. Scan the machine with nmap, how many ports are open?</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/731/1*POGV0M_uRCmXdTv7qiA9KA.png" /><figcaption>Sometimes, you just don’t need any switches :)</figcaption></figure><p>Ans : 7</p><p>2. <strong>Enumerating Samba for shares</strong></p><p>Q1. Using the nmap command above, how many shares have been found?</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/901/1*pHLeQ9raffhg7F3lfvZPVA.png" /></figure><p>Ans : 3</p><p>Q2. Once you’re connected, list the files on the share. What is the file can you see?</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/676/1*tK6C6JsQI6KD4jiQU1qOqw.png" /></figure><p>Ans : log.txt</p><p>Q3. What port is FTP running on?</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1014/1*wxRjaCJiilfXi-z-ojvIYQ.png" /></figure><p>Ans : 21</p><p>Q4. What mount can we see ?</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/711/1*P2ds0knO_9iFlUt9p3D8Ew.png" /></figure><p>Ans : /var</p><p>3. <strong>Gain initial access with ProFtpd</strong></p><p>Q1. Lets get the version of ProFtpd. Use netcat to connect to the machine on the FTP port. What is the version?</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/641/1*HxKT_sc8zEPzzkAVrKxvBQ.png" /></figure><p>Ans : 1.3.5</p><p>Q2. How many exploits are there for the ProFTPd running?</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*99d7vdieptUPez31RmY-Dg.png" /></figure><p>Ans : 4</p><p>Q3. We know that the FTP service is running as the Kenobi user (from the file on the share) and an ssh key is generated for that user.</p><p><em>(No answer needed)</em></p><p>The mod_copy expoit allows us to copy files from any part of the filesystem to a chosen destination.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/664/1*L5eK_Ikf1OoHnkInUvWB_A.png" /></figure><p>Q4. We knew that the /var directory was a mount we could see (task 2, question 4). So we’ve now moved Kenobi’s private key to the /var/tmp directory.</p><p><em>(No answer needed)</em></p><p>Q5. What is Kenobi’s user flag (/home/kenobi/user.txt)?</p><p>Now, since we’ve copied the file to /var/tmp, let’s try to mount that dir to our local machine.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*qU861wsRi6ebcXGKlQifNg.png" /></figure><p>Copy the id_rsa file to your location, chmod 600 it and then ssh into kenobi using the private key obtained.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*mEc0iBbD17bBypTrTfXDNg.png" /></figure><p>Ans : d0b0f3f53b6caa532a83915e19224899</p><p>3. <strong>Privilege Escalation with Path Variable Manipulation</strong></p><p>Q1. What file looks particularly out of the ordinary?</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/795/1*vhDNo2XRpmnF6r7VL8DRTA.png" /><figcaption>find / -perm -u=s -type f 2&gt;/dev/null (Use this to find all SUID files)</figcaption></figure><p>Ans : /usr/bin/menu</p><p>Q2. Run the binary, how many options appear?</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/631/1*rGlOxkl8g4JoOJCfcgncrg.png" /></figure><p>Ans : 3</p><p>Q3. What is the root flag (/root/root.txt)?</p><p>Checking strings on /usr/bin/menu, we can find that the binary is running without full path.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/697/1*58YoWABZg9dPt2HNLiGLZw.png" /></figure><p>Also, since it runs with root privileges, let’s try to manipulate the path to gain root.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/854/1*EJL6uuzY5VBH31Sed_g0vw.png" /></figure><p>Ans : 177b3cd8562289f37382721c28381f02</p><p>Feel free to contact me at @thebinarybot in twitter if you feel there’s any correction(s) to be made in this article or for help to solve this room. Cheers :)</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=bd8b737afb77" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[TryHackMe — Basic Pentesting | CTF | Beginner Friendly Walkthrough]]></title>
            <link>https://thebinarybot.medium.com/tryhackme-basic-pentesting-ctf-beginner-friendly-walkthrough-320f8519fbb4?source=rss-b28e3e1c3f63------2</link>
            <guid isPermaLink="false">https://medium.com/p/320f8519fbb4</guid>
            <category><![CDATA[tryhackme]]></category>
            <category><![CDATA[ctf]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[tryhackme-walkthrough]]></category>
            <category><![CDATA[ctf-writeup]]></category>
            <dc:creator><![CDATA[Nithin R]]></dc:creator>
            <pubDate>Thu, 05 Aug 2021 13:03:18 GMT</pubDate>
            <atom:updated>2021-08-06T07:12:16.254Z</atom:updated>
            <content:encoded><![CDATA[<h3>TryHackMe — Basic Pentesting | CTF | Beginner Friendly Walkthrough</h3><p>Hello, this is Nithin here. I’m a security researcher / enthusiast and I go by the handle @thebinarybot at most of the places online.</p><p>Basic Pentesting is a very beginner friendly CTF at TryHackMe. Here’s my write-up on how I solved this room.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/250/0*IoUHVrHpPTvCxKAK.png" /><figcaption>Source : <a href="https://tryhackme.com/room/basicpentestingjt">tryhackme.com</a></figcaption></figure><ol><li><strong>Web App Testing and Privilege Escalation</strong></li></ol><p>Q1. Deploy the machine and connect to our network</p><p><em>(No answer needed)</em></p><p>Q2. Find the services exposed by the machine</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*c7j1F5HrDgmsoXfj5Q2YZA.png" /></figure><p><em>(No answer needed)</em></p><p>Q3. What is the name of the hidden directory on the web server(enter name without /)?</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/818/1*O2lCovtSk7H2HJtI20wx5w.png" /></figure><p>Ans : development</p><p>Q4. User brute-forcing to find the username &amp; password</p><p><em>(No answer needed)</em></p><p>Q5. What is the username?</p><p>We know SMB is open in port 139 and 445, so I tried hitting ports 139 and 445 to check for usernames.</p><p>I used enum4linux for this purpose. One can download the tool <a href="https://github.com/CiscoCXSecurity/enum4linux">here</a>.</p><p>Upon performing a scan, I got the below results.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/763/1*oUmnqzKbV89mPNP7p3ya0g.png" /><figcaption>./enum4linux -a IP</figcaption></figure><p>Ans : jan</p><p>Q6. What is the password?</p><p>For this task, I used hydra to do a brute-force with rockyou.txt and got the below result.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*_W7-t0BDJIPguGdAT0lO0g.png" /></figure><p>Ans : armando</p><p>Q7. What service do you use to access the server(answer in abbreviation in all caps)?</p><p>Ans : ssh</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/867/1*_bQYV4kysdMJnDV9X3qS7A.png" /></figure><p>Q8. Enumerate the machine to find any vectors for privilege escalation</p><p><em>(No answer needed)</em></p><p>Q9. What is the name of the other user you found(all lower case)?</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/798/1*ePEsaDgMzBKnYXTp61R8dw.png" /></figure><p>Just enumerating, we found another user</p><p>Ans : kay</p><p>Q10. If you have found another user, what can you do with this information?</p><p>pass.bak wasn’t readable so maybe we can try to look into ssh folder and check if there’s id_rsa</p><p><em>(No answer needed)</em></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/909/1*6hFg2MpQnYqufmQjghrcyw.png" /><figcaption>Copy paste this file to your local machine</figcaption></figure><p>Turns out there’s id_rsa and it’s readable. We can copy this file to our local machine and then use ssh2john to get the hash.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*k8GkA8ryi1Q4RbRo6v8ZcA.png" /></figure><p>Once done, we can use john to crack the hash.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*umVB1MNFMIbdRtGQr2ANCg.png" /></figure><p>Q11. What is the final password you obtain?</p><p>To find this, we need to login into kay’s account and read pass.bak</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/818/1*7xCon89zmNE4jWwJw9mLNg.png" /></figure><p>But accessing kay’s account from local machine wasn’t possible. So I tried to login into kay’s from jan’s account.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/745/1*664ANIE0BO0gvw-q--r3lw.png" /></figure><p>And, Viola.</p><p>Ans : heresareallystrongpasswordthatfollowsthepasswordpolicy</p><p>Feel free to contact me at @thebinarybot in twitter if you feel there’s any correction(s) to be made in this article or for help to solve this room. Cheers :)</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=320f8519fbb4" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[TryHackMe — Vulnversity | CTF | Beginner Friendly Walkthrough]]></title>
            <link>https://thebinarybot.medium.com/tryhackme-vulnversity-ctf-beginner-friendly-walkthrough-357cafc6a46d?source=rss-b28e3e1c3f63------2</link>
            <guid isPermaLink="false">https://medium.com/p/357cafc6a46d</guid>
            <category><![CDATA[tryhackme]]></category>
            <category><![CDATA[ctf]]></category>
            <category><![CDATA[ctf-writeup]]></category>
            <category><![CDATA[tryhackme-walkthrough]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <dc:creator><![CDATA[Nithin R]]></dc:creator>
            <pubDate>Wed, 04 Aug 2021 18:39:24 GMT</pubDate>
            <atom:updated>2021-08-04T18:39:24.834Z</atom:updated>
            <content:encoded><![CDATA[<h3>TryHackMe — Vulnversity | CTF | Beginner Friendly Walkthrough</h3><p>Hello, this is Nithin here. I’m a security researcher / enthusiast and I go by the handle @thebinarybot at most of the places online.</p><p>Vulnversity is an easy and beginner friendly CTF at TryHackMe. Here’s my write-up on how I solved this room.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/800/0*5iP1Re426v6_Fn7-.png" /></figure><ol><li><strong>Deploy the machine</strong></li><li><strong>Reconnaissance</strong></li></ol><p>In any CTF challenge, it’s quite trivial to perform a basic recon using Nmap. Here’s how I did my Nmap scan.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*v8R8fl75DLNOuxeOzvsTHw.png" /><figcaption>nmap -sV -A -Pn -v IP</figcaption></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*3J9ybEI7R_oqO73ptZb60Q.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*KWSZuVKRr3nTMLyIIprO2A.png" /></figure><p>Switches and it’s meanings :</p><ul><li>-sV : Used to determine the version of the services running</li><li>-A : Aggressive scan which enables OS and version detection. It also executes in-build scripts for further enumeration.</li><li>-Pn : Used to disable host discovery and just scan for open ports</li><li>-v : Verbose output</li></ul><p>Q1. Scan the box, how many ports are open?</p><p>Ans : 6</p><p>Q2. What version of the squid proxy is running on the machine?</p><p>Ans : 3.5.12</p><p><em>(Check Port 3128)</em></p><p>Q3. How many ports will nmap scan if the flag <strong>-p-400 </strong>was used?</p><p>Ans : 400</p><p><em>(Trivial)</em></p><p>Q4. Using the nmap flag <strong>-n</strong> what will it not resolve?</p><p>Ans : DNS</p><p>Q5. What is the most likely operating system this machine is running?</p><p>Ans : Ubuntu</p><p><em>(Check Port 22)</em></p><p>Q6. What port is the web server running on?</p><p>Ans : 3333</p><p><em>(Look for Host: VULNVERSITY in your Nmap scan result)</em></p><p>3. <strong>Locating directories using GoBuster:</strong></p><p>My scan results,</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*10376WmkY9A7B1vWWsaQUg.png" /><figcaption>gobuster dir -u <a href="http://ip:port">http://ip:port</a> -w wordlist.txt</figcaption></figure><p>Q1. What is the directory that has an upload form page?</p><p>Ans : internal/</p><p>4. <strong>Compromise the webserver</strong></p><p>First proxy your connection using Burp, and visit IP:3333/internal where you’ll have the ability to upload a file.</p><p>Q1. Try upload a few file types to the server, what common extension seems to be blocked?</p><p>Ans : .php</p><p>Q2. Run this attack, what extension is allowed?</p><p>Ans : .phtml</p><p>After uploading the reverse shell and listening using netcat at the specified port,</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Eb15kczYXN4vICEW68CmfA.png" /><figcaption>Reverse shell in execution</figcaption></figure><p>Q3. What is the name of the user who manages the webserver?</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*LK6m82cZyV4Td_la8MZwUQ.png" /></figure><p>Ans : bill</p><p>Q4. What is the user flag?</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*VgOF8eaRRzQwhCL6D-qPGQ.png" /></figure><p>Ans : 8bd7992fbe8a6ad22a63361004cfcedb</p><p>5. <strong>Privilege Escalation</strong></p><p>This part is the most interesting and challenging part in this entire room. I’ll try to brief this to the best possible.</p><p>Q1. On the system, search for all SUID files. What file stands out?</p><p>To find this, run “find / -user root -perm -4000 -exec ls -ldb {} \;”</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*-SI4acAXOz4QbJtImnmgaA.png" /></figure><p>Upon executing the above command, you’ll be able to see /bin/mount, /bin/ping … etc as SUID files, but however /bin/systemctl looks intimidating to check and that’s the answer for this question.</p><p>Ans : /bin/systemctl</p><p>Q2. Become root and get the last flag (/root/root.txt)</p><p>Now this is going to be quite a long run.</p><p>First, what is systemctl ?</p><blockquote>The systemctl command is a utility which is responsible for examining and controlling the systemd system and service manager — www.liquidweb.com</blockquote><p>Knowing that /bin/systemctl is a SUID file, the first place to check for a potential escalation is gtfobins. So I ended up visiting <a href="https://gtfobins.github.io/gtfobins/systemctl/">https://gtfobins.github.io/gtfobins/systemctl/</a></p><p>By default systemctl will search these files in <strong>/etc/system/systemd, </strong>but since we don’t have access to the paths that’s owned by root, we’ll try to create one.</p><p>This can be done by creating an environment variable, then create a service or unit file and assign this to the environment variable we created.</p><p>First, creating an environment variable,</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/281/1*Z1iBBSaNTFKYeLLrMckvdA.png" /><figcaption>Create environment variable named prvesc</figcaption></figure><p>The above command basically creates an environmental variabled called prvesc (you can give whatever name you want) and calls the mktemp command to create a temporary file as a systemd service unit file.</p><p>Next, we need to create a service which access the root.txt file and redirects it to tmp from where we can read.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/480/1*6Viu2awV9Y7wx_pTLH53bw.png" /><figcaption>Create service which reads /root/root.txt and redirects it to tmp/output</figcaption></figure><p>The above command does the following :</p><ul><li>echo ‘[Service]<br>&gt; ExecStart=/bin/sh -c “cat /root/root.txt &gt; /tmp/output”</li></ul><p>This is used to tell the service that when it starts, read the contents in root/root.txt and redirect the output to /tmp/output</p><ul><li>[Install]<br>&gt; WantedBy=multi-user.target’ &gt; $prvesc</li></ul><p>This is used to set the run level and redirect it to the environment variable we created.</p><p>Now we need to link the environment variable to systemctl in such a way that it makes our unit file available for systemctl commands no matter on what path it is.</p><p>That can be done by executing,</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/767/1*U2_yyZTjhPC2iYgPwsz81Q.png" /></figure><p>Now once the symlink is created, we need to enable this service and the required output will be available at /tmp/output. That can be done by executing the below command.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/996/1*UaQXCErREBawIx8Pr17Xhg.png" /></figure><p>Now we need to navigate to /tmp/output to retrieve the flag.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*eNjLXb3FF22yEQalCR1f6A.png" /></figure><p>Ans : a58ff8579f0a9270368d33a9966c7fd5</p><p>Overall, this is everything I did.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*QTe_Y1pxlE_W8C7u_HXiQw.png" /><figcaption>Privilege Escalation</figcaption></figure><p>Feel free to contact me at @thebinarybot in twitter if you feel there’s any correction(s) to be made in this article or for help to solve this room. Cheers :)</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=357cafc6a46d" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[TryHackMe — Pickle Rick | CTF | Beginner friendly Walkthrough]]></title>
            <link>https://thebinarybot.medium.com/tryhackme-pickle-rick-ctf-beginner-friendly-walkthrough-7f6033c03aec?source=rss-b28e3e1c3f63------2</link>
            <guid isPermaLink="false">https://medium.com/p/7f6033c03aec</guid>
            <category><![CDATA[tryhackme-writeup]]></category>
            <category><![CDATA[tryhackme-walkthrough]]></category>
            <category><![CDATA[tryhackme]]></category>
            <category><![CDATA[capture-the-flag]]></category>
            <dc:creator><![CDATA[Nithin R]]></dc:creator>
            <pubDate>Tue, 27 Jul 2021 18:51:03 GMT</pubDate>
            <atom:updated>2021-07-30T09:59:29.759Z</atom:updated>
            <content:encoded><![CDATA[<h3>TryHackMe — Pickle Rick | CTF | Beginner Friendly Walkthrough</h3><p>Hello, this is Nithin here. I’m a security researcher / enthusiast and I go by the handle @thebinarybot at most of the places online.</p><p>Pickle Rick is quite an easy and beginner friendly CTF at TryHackMe. Here’s my write-up on how I solved this room.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/512/0*MaOPzXn-S8XNA8-l.jpeg" /></figure><ol><li><strong>Port Scan</strong></li></ol><p>Port scan is the first things you should try to gain information about the attack surface. I use NMAP for this purpose.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*GH88YKIF867B-LwUY3oacQ.png" /></figure><p>I just did a basic nmap scan using “nmap -A -sV — top-ports 1000 TARGET_IP”</p><p>Upon running this scan, I was able to find that port 22 and 80 were open, ie ssh and http.</p><p>2. <strong>Web Server Check</strong></p><p>Since I knew http was open, I visited <a href="http://TARGET_IP">http://TARGET_IP</a> and found this.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*FBe8czcRkmbkvmYRwsjwSg.png" /></figure><p>Checking the source code (Right Click -&gt; View Page Source), I found this.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*KHyafIYqusFuOv7EC03jBA.png" /></figure><p>At this point, I have another information with me, which is the username.</p><p>3. <strong>Content Discovery</strong></p><p>After finding the username, I was looking for some password.txt or some file that has the password stored.</p><p>Hence, I ran gobuster for directories and files using dirbuster-medium word-list that I use pretty much everywhere for content discovery.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*R-b3FduKj84e8Psw5Ti2bg.png" /><figcaption>The -x flag is used to provide extensions which will get appended at the end of each word in the wordlist.</figcaption></figure><p>I was able to find juicy information from the scan and I first checked robots.txt as robots.txt usually contains locations that aren’t supposed to be indexed.</p><p>Upon vising <a href="http://TARGET_IP/robots.txt">http://TARGET_IP/robots.txt</a> I was able to find the below information.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*d0CkwCeRQmpUVDJnSBDfeA.png" /></figure><p>My instinct said this is the password and I quickly visited <a href="http://TARGET_IP/login.php">http://TARGET_IP/login.php</a> to test it out.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*rg8E_lFXA8fWsvluscLR2A.png" /></figure><p>And viola, I got logged in.</p><p>Now since there’s something called Command Panel, I wanted to test various commands and see if I can pull off something.</p><p>4. <strong>Flag 1</strong></p><p>First, I ran ls to see what all files are listed.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*mmzFlY66PsK-NS8vLTHBEA.png" /></figure><p>Ran “cat Sup3rS3cretPickl3Ingred.txt”, and I got this.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*QIrDEutkkhsME0UvJWWKiA.png" /></figure><p>Tried running head, tail but they didn’t work either. At last, I tried running “less Sup3rS3cretPickl3Ingred.txt” and I got the first flag.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*oZIEl1l6-DhZjOPGgAr3kw.png" /></figure><p>Flag 1 : mr. meeseek hair</p><p>5. <strong>Flag 2</strong></p><p>I had quite a lot of information in hand. I had /assets folder which I wanted to check and I had clue.txt which I wanted to check as well. I first checked clue.txt using the same less command and got this.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*rTyA5D54adAZBW9CSFlRQw.png" /></figure><p>Now that I know I’ve to check for file system. I first ran ls /home to which I got this below.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*WP3nBmVSM9B6qw3wANkSig.png" /></figure><p>Navigating inside rick, I was able to find a directory named “second ingredients”. Navigating inside that folder, there was a file named “/home/rick/second ingredients” without any extension.</p><p>So I ran file FILENAME to see what the file type was.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*FJ7M0TVq2zavTHinU22BFQ.png" /></figure><p>Knowing that it is a text file, I ran “less FILENAME” and got the second flag.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*JhGh5ZwbT7IW7SLKu4-y5A.png" /></figure><p>Flag 2 : 1 jerry tear</p><p>6. <strong>Flag 3</strong></p><p>I checked the /assets directory, but couldn’t find anything interesting there.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*9UM7lNVw2iHc7KY6OmaTWA.png" /></figure><p>I tried checking ls /home/ubuntu instead of ls /home/rick but that didn’t result in anything. Moving a step back I checked “ls /”, to which I got this.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*rWMsy_5wbHmxahtx74E04w.png" /></figure><p>There obviously is a root directory and I wanted to check it but “ls /root” didn’t work. So I tried running it with escalated privilege by using “sudo ls /root” to which I got this.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*W3r5NoqiFqILbDHgRWrkwg.png" /></figure><p>Now running “sudo less /root/3rd.txt”, I got the final flag and solved this challenge.</p><p>Flag 3 : fleeb juice</p><p>Feel free to contact me at @thebinarybot in twitter if you feel there’s any correction(s) to be made in this article or for help to solve this room. Cheers :)</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=7f6033c03aec" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Understanding Docker with Pentester Academy for FREE]]></title>
            <link>https://thebinarybot.medium.com/understanding-docker-with-pentester-academy-for-free-7441c3f5b80c?source=rss-b28e3e1c3f63------2</link>
            <guid isPermaLink="false">https://medium.com/p/7441c3f5b80c</guid>
            <category><![CDATA[containers]]></category>
            <category><![CDATA[docker]]></category>
            <category><![CDATA[infosec]]></category>
            <category><![CDATA[application-development]]></category>
            <dc:creator><![CDATA[Nithin R]]></dc:creator>
            <pubDate>Sun, 25 Jul 2021 20:06:28 GMT</pubDate>
            <atom:updated>2021-07-25T20:06:28.638Z</atom:updated>
            <content:encoded><![CDATA[<p>Hello, this is Nithin here. I’m a security researcher / enthusiast and I go by the handle @thebinarybot at most of the places online.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/336/0*TLTOGGWfAt3sEruG.png" /></figure><p>“Docker” is a word that we all have come across and is quite a buzz word at the moment. But what exactly is docker and how do I test what it does?</p><p>I’ll help you answer the first part, but go register at Pentester Academy (<a href="https://www.pentesteracademy.com/">https://www.pentesteracademy.com/</a>) and continue reading this article to explore get answered for the second part.</p><p><strong>What is Docker ?</strong></p><p>Before trying to understand what Docker is, let’s have a look at what issue Docker is trying to solve. Once you know what problem a particular software package is trying to solve, you’ll get a wider understanding of the package as well.</p><p>Whenever we try to create software applications, there are instances where the program I create works absolutely fine in my machine but wouldn’t work as expected when it’s uploaded to a server or tested in my friend’s machine. If you’re a developed you’d have come across this situation as well.</p><p>One of reasons why this issue pops up is because of the difference in dependencies. Most of the software applications are dependent upon other packages to work. Simply put, those packages are called as dependencies. You might have installed all the required dependencies in your machine but your friend wouldn’t have and that most likely would’ve caused the issue of not working in his computer.</p><p>Docker is a software application that solves the above mentioned issue by creating containers. So essentially, once you create a container it stores your code, your dependencies, your configuration, the processes you’re running and many more necessary details. Once created, you can easily share this docker image with your friend who upon installing this need not go through any hassle of installing custom dependencies, modify config files etc.</p><p><strong>Quick shout-out to Pentester Academy</strong></p><p>Pentester Academy is a company that teaches you Pentesing practically. One of the best things about Pentester Academy is their browser-built laboratories. I’ve always liked learning things practically and testing them and the labs in Pentester Academy provided a very hassle free experience on exploring and maneuvering. Most of the labs are priced but there are a couple of community (free) labs you can try out as well.</p><p><strong>Docker Lab at Pentester Academy</strong></p><p>The Docker Lab at Pentester Academy is completely free of cost and you can visit at <a href="https://attackdefense.pentesteracademy.com/challengedetails?cid=1342">https://attackdefense.pentesteracademy.com/challengedetails?cid=1342</a>. The instructions for this laboratory is very straight forward. What’s even better is the availability of a detailed Lab Manual that can be downloaded, for free of cost. To add cherry on top of the cake, they also have a detailed video walk through for every lab session which you can refer if stuck at some point.</p><p>This particular docker lab doesn’t have any task to complete as such but only practice the commands.</p><p>Here are some of the basic things that you might want to try :</p><ol><li>Checking version using docker version</li></ol><p>The above command displays a detailed version of the application. Alternatively, you can also run another command to just display the version number</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*X518rN5eH520-YhOkfsclw.png" /></figure><p>2. Downloading image using docker pull</p><p>This command is used to pull a docker image. Since docker also acts like a social networking platform where you can download files, this becomes easy.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/933/1*biadGHwFyt7B38eWSNKQzA.png" /></figure><p>Once you’ve pulled a couple of images, to list all the images, you can use “docker images”</p><p>3. Running in different modes</p><p>You can run docker basically in two modes, the background mode and the interactive mode.</p><p>To run in background mode, use “docker run -dt name_of_the_image”</p><p>To run in interactive mode use “docker run -it name_of_the_package”</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*wFjfo0NygFQO2kb3eJBh1g.png" /></figure><p>4. Inspecting an image</p><p>To inspect an image, you need to know the container ID. To get container ID you can run “docker ps” which basically lists all running containers.</p><p>Once you have the container ID, you can run docker inspect ID to inspect the docker image</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*a5-GvC29C8xtR7tG6G2NNg.png" /></figure><p>5. Stop container</p><p>To start or stop a container, you need the container ID. Once you have the ID, you can run “docker stop ID”.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*KqWBu-XL_LqDTxw0pPDd5g.png" /></figure><p>These are some of the very basic commands you can test with docker. The detailed walk-through and Lab Manual provided by Pentester Academy definitely will teach you a lot on docker. Do check them out.</p><p>If there’s any correction to be made in this article or to discuss anything security feel free to contact me at @thebinarybot in twitter. Have a great day !</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=7441c3f5b80c" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[The ultimate “ how to get started in cybersecurity ” question answered with TryHackMe]]></title>
            <link>https://thebinarybot.medium.com/the-ultimate-how-to-get-started-in-cybersecurity-question-answered-with-tryhackme-6c9d189e5f3c?source=rss-b28e3e1c3f63------2</link>
            <guid isPermaLink="false">https://medium.com/p/6c9d189e5f3c</guid>
            <category><![CDATA[tryhackme]]></category>
            <category><![CDATA[information-security]]></category>
            <category><![CDATA[capture-the-flag]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <dc:creator><![CDATA[Nithin R]]></dc:creator>
            <pubDate>Fri, 09 Jul 2021 17:30:44 GMT</pubDate>
            <atom:updated>2021-07-25T20:08:15.795Z</atom:updated>
            <content:encoded><![CDATA[<h3>The ultimate “ how to get started in cybersecurity ” answered with TryHackMe</h3><p>Hello, this is Nithin here. I’m an independent security researcher and I go by the handle of @thebinarybot in most of the places online.</p><p>I vaguely started my cybersecurity journey about a couple of months back and hoped to find myself a way to becoming something. The “something” wasn’t defined, nor the path. Although I never felt short of resources, I always asked myself if this is the correct path or what is the correct path to learn cybersecurity. When I started, I did what any beginner would do. I enrolled myself in numerous paid and free courses, installed Kali Linux in hopes of magically becoming a hacker overnight, started looking out for more courses in udemy, cybrary etc. I was intimidated by the amount of resources available online, started learning things here and there and ultimately ended up at a point where I had no clue of what I was doing and what I wanted to become.</p><p>If you’re a cybersecurity enthusiast and looking for a learning path, don’t worry I got you covered. I wish I knew this when I initially got started and I don’t want you to feel the same.</p><p>In this article, I’m going to talk about TryHackMe (THM), an online platform for learning cybersecurity and how it helped me get started. Also, I’m not an ambassador of THM who’s trying to promote this platform but merely a student / learner who got benefited from THM. Read the article completely to know how to win vouchers which includes OSCP exam vouchers worth 1000$ and THM premium vouchers etc.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/824/0*D1z4MJwPDzD0K4kJ.png" /><figcaption>Checkout TryHackMe at : <a href="https://tryhackme.com/signup?referrer=86748defa411">www.tryhackme.com</a></figcaption></figure><p><strong>What is TryHackMe ?</strong></p><p>TryHackMe, as I mentioned earlier, is an online platform to learn cybersecurity. It’s a freemium, meaning you get to learn a lot of things for free but you have to subscribe monthy / annually to unlock certain premium content.</p><p><strong>What’s so compelling about TryHackMe ?</strong></p><p>The quality and labs. Yes, the quality of content what TryHackMe produce is truly wonderful and most importantly they have hands-on practice laboratory sessions which is exactly what I wanted.</p><p>TryHackMe has clear cut learning paths such as the recently launched “Pre Security” which teach you the per-requisites of cybersecurity in order. The Pre Security learning path also tells you what paths you can explore once it is completed. This include the likes of “Cyber Defense” and “Offensive Pentesting”. Every learning path has study guides and labs which are jointly called as Rooms. They are Capture-The-Flag themed simulated machines, where one’s task is to dig into the machine provided and obtain the flag (solution). Trust me, it’s so interesting. You can find further information about machines and their access at the website once you’ve singed up for free.</p><p><strong>What should I do now to get started ?</strong></p><p>All you have to do to get started is visit <a href="https://tryhackme.com/signup?referrer=86748defa411">www.tryhackme.com</a>. Once done, enroll yourself in the Pre Security path and start learning. It’s completely free, so why not give it a shot.</p><p>The Pre Security path covers a lot of topics such as “What is Networking” , “Intro to LAN”, “DNS in detail” , “Linux Fundamentals”, “Windows Fundamentals” etc.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*5ORRqVzvDPAMvnHrbeE18w.png" /><figcaption>Checkout Pre Security learning path at : <a href="https://tryhackme.com/path/outline/presecurity">https://tryhackme.com/path/outline/presecurity</a></figcaption></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*xM7qSpEGlxIAW9LYc5zvcg.png" /><figcaption>On the left side, you have the learning material and on the right side you have an attack box which can be deployed with the help of a single mouse click</figcaption></figure><p>Upon completion of all the paths, you’ll also earn a certificate. But certain rooms in the learning path such as “OSI Model” are only available for those who have subscribed. You can enroll for free and check out the free content initially and if you find it interesting and useful you can go ahead and subscribe.</p><p><strong>Pre Security learning path and tickets</strong></p><p>If you’re reading this before July 15, then you’re absolutely lucky. This is because since the Pre Security path has been recently launched, THM is giving away prizes worth $5000+ which you can avail in by collecting tickets. Upon grabbing 3 tickets of the same kind, you can redeem them. Some interesting tickets which you might not want to miss are, OSCP exam vouchers worth upto $1000 and 3 months THM premium vouchers, etc.</p><p>And to collect tickets, all you need to do is just complete the Pre Security learning path. Yes, you get gifts for learning. Upon the completion of a task in the Pre Security learning path, you’ll be awarded a ticket.</p><p>— — — — — — — — — — — — — — — — — — — — — —</p><p>Thank you for reading this article.</p><p>Checkout TryHackMe at : <a href="https://tryhackme.com/signup?referrer=86748defa411">www.tryhackme.com</a><br>Checkout the Pre Security learning path at : <a href="https://tryhackme.com/path/outline/presecurity">https://tryhackme.com/path/outline/presecurity</a></p><p>Free free to connect with me @thebinarybot in twitter. Have a great day ahead and stay safe :)</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=6c9d189e5f3c" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>