Metasploitable2 Walkthrough

For this walk-though I use the Metasploit framework to attempt to perform a penetration testing exercise on Metasploitable 2. I employ the following penetration testing phases: reconnaisance, threat modelling and vulnerability identification, and exploitation. Since this is a mock exercise, I leave out the pre-engagement, post-exploitation and risk analysis, and reporting phases. Set-up This metasploitable walk-through is performed in a virtual lab environment. Two virtual machines (VMs) are used. The first is a Kali VM and the second is the Metasploitable2 VM.

Read More →

Cross compile libpcap for Arm

This has been tested on Ubuntu 16.04.1 Desktop (64-bit), and assumes that arm-linux-gnuabi-gcc has already been installed, e.g. sudo apt-get install -y gcc-arm-linux-gnueabi Download the latest libpcap source tar ball from [http://www.tcpdump.org/#latest-releases], e.g. libpcap-1.8.1.tar.gz tar zxvf libpcap-1.8.1.tar.gz apt-get install flex bison byacc export CC = arm-linux-gnueabi-gcc ./configure –host=arm-linux –with-pcap=linux make Once the library has been compiled, it may be linked to other code, using the -L gcc flag and the location of the library.

Read More →

New Blog

I’d been using blogger for a while now, but found that the last couple of years had not bothered making and publishing notes to my blog as I normally did. Blogger also has has some weird formatting issues (because I cannot HTML). So I decided to migrate to a static blog. Before proceeding I decided to document a number fo requirements I would like addressed. Requirements Migrate to static web pages instead of CMS Easily update blog with short posts (to force myself to post regularly).

Read More →

PCAP or it didn’t happen

“PCAP or it didn’t happen” is a good network security philosophy. The primary idea being to capture network traffic for analysis. In a non-corporate environment where a CentOS-based Linux host has been used as a dual homed firewall (refer to the lame ASCII art network diagram below), tcpdump was used for continuous traffic capture. _( )______ ________ +-----+ _( )__ ( Internet )---/ Router \----| F/W |----( DMZ ) (____________) \________/ +-----+ (________) Firstly, we create a location to save the pcap files.

Read More →

vulnhub.com sickos1.1

host: 192.168.56.1 dhcp-server: 192.168.56.100 kali: 192.168.56.101 * log # 2015/12/26 19:00 -> 19:40 (40min) # 2015/12/26 22:10 -> 23:50 (1hr 40min) # 2015/12/27 18:20 -> 18:40 (20min) # total time = 2hr 40min) * discovery - target * nmap --min-parallelism=100 -sP -T5 192.168.56.0/24 * found: 192.168.56.102 * discovery - services * nmap --min-parallelism=100 -A -T5 -p1-65535 192.168.56.102 * found: port 22/tcp ssh, 3128/tcp squid, 8080/tcp ?? * !!exploit-db did not reveal much * tried: nc -n -v 192.

Read More →

Error importing into Virtualbox

Open visualisation format (OVF) is an open standard for packaging and distributing virtual appliances. Essentially this is meant to ensure portability of software and virtual machines across different hypervisors, such as vmware, virtualbox, etc. However, I got an error when importing an OVF file into virtualbox Version 5.0.12 r104815 “Host resource of type “Other Storage Device (20)” is supported with SATA AHCI controllers only, line 47.” Error reading "XXXXXX.ovf": Host resource of type "Other Storage Device (20)" is supported with SATA AHCI controllers only, line 47.

Read More →

vulnhub.com fristileaks1.3

host: 192.168.56.1 dhcp-server: 192.168.56.100 kali: 192.168.56.101 * log # 2015/12/24 14:45 -> 16:30 (1hr 45min) # 2015/12/25 15:00 -> 17:45 (2hr 45min) # total time = 4hrs 30min * discovery - target * nmap --min-parallelism=100 -sP -T5 192.168.56.0/24 * found target: 192.168.56.102 * discovery - services * nmap --min-parallelism=100 -A -T5 -p1-65535 192.168.56.102 * found ports: 80 * enumerate port 80 * wget http://192.168.56.102 * cat index.html * wget http://192.168.56.102/images/keep-calm.png * wget http://192.

Read More →

.vimrc

set nobackup “ do not save ~file set backspace=2 " backspace in insert mode like other editors set cursorline " location of cursor shown as underscore syntax on " syntax highlighting set number " line numbers filetype indent on " activates indenting for files set autoindent " auto indenting set si " smart indent set expandtab " use spaces instead of tabs set smarttab " use smarts when tabbing set shiftwidth=2 " 1 tab == 2 spaces set tabstop=2 set softtabstop=2 set textwidth=130 " wrap lines 130 chars, wide-carriage :) set hlsearch " highlight search results set incsearch " incremental search to move result while typing set showmatch " show matching brackets

Read More →

Metasploitable2 Walk-through

*(This is an interim post and will be updated progressively. This note will be removed once done.)* This post extends the walk-though on the initial version of Metasploitable at http://nkush.blogspot.com.au/2011/09/metasploitable-walkthrough.html. It should be noted that some commands and output may have been truncated for the purposes of brevity. Set-up The set-up included two machines in a virtual test environment using VirtualBox. The first was a Metasploitable virtual machine (VM) and the

Read More →

Setting up git

Git is yet another open source version control, and seems to be the tool of choice for contemporary coding mavericks. I still prefer svn and cvs, for centralised version control, but can appreciate why some projects may require distributed repositories as afforded by git. Setting up a central git repository on a server is easy. You basically setup a user, whose home directory is used to store the repositories, and allow access to people using keys, where the user retain their

Read More →