Writeup - Animetronic

Let’s start with an arpsweep to discover the targets IP address: sudo nmap -sn 192.168.56.100/24 -oN arpsweep.txt Which results as: Starting Nmap 7.95 ( https://nmap.org ) at 2025-04-01 18:47 CEST Nmap scan report for 192.168.56.1 Host is up (0.00021s latency). MAC Address: 0A:00:27:00:00:00 (Unknown) Nmap scan report for 192.168.56.10 Host is up (0.00020s latency). MAC Address: 08:00:27:E9:B5:FB (PCS Systemtechnik/Oracle VirtualBox virtual NIC) Nmap scan report for 192.168.56.110 Host is up (0.00042s latency). MAC Address: 08:00:27:DE:0D:24 (PCS Systemtechnik/Oracle VirtualBox virtual NIC) Nmap scan report for 192.168.56.100 Host is up. Nmap done: 256 IP addresses (4 hosts up) scanned in 2.15 seconds Target is 56.110 ...

April 1, 2025 · XoanOuteiro

[ES] Writeup de la máquina Noob

Arpsweep: sudo nmap -sn 192.168.56.100/24 -oN arpsweep.txt Starting Nmap 7.95 ( https://nmap.org ) at 2025-03-27 17:51 CET Nmap scan report for 192.168.56.1 Host is up (0.00019s latency). MAC Address: 0A:00:27:00:00:00 (Unknown) Nmap scan report for 192.168.56.10 Host is up (0.0010s latency). MAC Address: 08:00:27:FB:FB:0A (PCS Systemtechnik/Oracle VirtualBox virtual NIC) Nmap scan report for 192.168.56.109 Host is up (0.00072s latency). MAC Address: 08:00:27:81:8F:71 (PCS Systemtechnik/Oracle VirtualBox virtual NIC) Nmap scan report for 192.168.56.100 Host is up. Nmap done: 256 IP addresses (4 hosts up) scanned in 2.25 seconds La IP es 192.168.56.109 ...

March 28, 2025 · XoanOuteiro

[ES] Escalada de privilegios en Linux

Ejemplos realizados en la máquina LPEP Escalada por exploits del Kernel Un ejemplo básico es usar exploits de kernel. Por ejemplo en este caso dirtycow (un fallo en el kernel que permite a un usuario no privilegiado modificar ficheros a los que solo podria acceder en modo lectura) Ejemplo: En este caso tenemos dirtycow en /tools: Podemos compilarlo y ejecutarlo. gcc -pthread c0w.c -o c0 ./c0 Tras un cierto tiempo recuperaremos la terminal. ...

March 21, 2025 · XoanOuteiro

[ES] Cheatsheet - Hacking Etico Tema 1

Recon DNS 1 Records WHOIS -> Punteros DNS con Dig -> Zonetransfer (A-REC) (comandos: nslookup, dnsenum, dig, whois, host) whois [dominio/IP/rango] host [dominio] host -t [tipoDeRegistro] [dominio] nslookup -type=[registro] [dominio] Recon DNS 2 Archivos de transferncia de zona: Realizando peticiones AXFR de un host a un nameserver Obtenemos los NS dig NS [dominio] Despues podemos realizar la comprobacion con host, dig, dnsenum y dnsrecon: dig [@nameserver] [dominio] axfr dnsenum [dominio] host -la [dominio] [nameserver] dnsrecon -d [domain] -t axfr Recon DNS 3 Enumeracion de subdominios: ...

February 3, 2025 · XoanOuteiro

[ES] Writeup de la maquina UNIT

Resolucion: Se trata de una maquina basada en una vulnerabilidad de RFI a RCE PHP mediante los metodos PUT y MOVE de HTTP Iniciamos con un ping sweep para descubrir la maquina. sudo nmap -sn 192.168.56.0/24 [sudo] password for kali: Starting Nmap 7.95 ( https://nmap.org ) at 2025-01-28 19:33 CET Nmap scan report for 192.168.56.1 Host is up (0.00028s latency). MAC Address: 0A:00:27:00:00:00 (Unknown) Nmap scan report for 192.168.56.10 Host is up (0.00031s latency). MAC Address: 08:00:27:A4:04:70 (PCS Systemtechnik/Oracle VirtualBox virtual NIC) Nmap scan report for 192.168.56.102 Host is up (0.00079s latency). MAC Address: 08:00:27:7B:8B:9E (PCS Systemtechnik/Oracle VirtualBox virtual NIC) Nmap scan report for 192.168.56.104 Host is up (0.00079s latency). MAC Address: 08:00:27:6B:C7:57 (PCS Systemtechnik/Oracle VirtualBox virtual NIC) Nmap scan report for 192.168.56.100 Host is up. Nmap done: 256 IP addresses (5 hosts up) scanned in 2.08 seconds Realizamos un ping por visibilidad: ...

January 29, 2025 · XoanOuteiro

[ES] Adquisicion de Evidencias para analisis forense

Existen dos tipos principales de adquisicion de la evidencia: Estatico o “Dead”: Consiste en apagar el ordenador tirando del cable, se recomienda mucho ya que permite una clonacion exacta, pero no se obtienen datos volatiles “Live” o en vivo: Se pueden obtener datos volatiles, pero se puede invalidar la evidencia ya que aun se podrian modificar los archivos. Tambien se pueden alterar los metadatos. A las imagenes obtenidas de este modo se les denomina difuminadas Los pasos a seguir independientemente del metodo incluyen: ...

January 27, 2025 · XoanOuteiro