Next up on my list was Knock-Knock 1.1 by zer0w1re. This was another older VM, but since I hadn’t done anything with port knocking yet, I figured I should. First things first, finding the IP of the VM.
The next walkthrough I decided to do was Pegasus by Knapsy. This was a slightly newer, and possibly more difficult, boot2root. First things first, netdiscover to get the IP of the vulnerable box.
The next boot2root that I decided to do was SecOS #1 from PaulSec. First up was to run netdiscover to find out where the new VM was located.
Real busy week at work this week, so just going to go over a simply simple binary to hex converter in Python for converting binary files to hex encoded strings (for use in shellcode, exploits, etc.).
While doing some auditing for a client recently, I ran across a webserver used for serving static pages called GoHttp. After a bit of research and testing, it appeared that this server was actually vulnerable to a few buffer overflow exploits resulting in remote code execution, denial of service, and some general memory/heap corruption and …
Last up in the series was Kioptrix 2014 (#5), so I decided to knock it out. (I know that I haven’t shown my enumeration scripts yet, and I know that the beginning of all of these seem redundant, but I’d like for all of them to be able to stand on their own.) First things …
Continuing along with the series, I decided to knock out Kioptrix Level 1.3 (#4). As usual, (though hopefully soon I’ll start showing off some of my enumeration scripts on here as well) I ran netdiscover to find the new VM.
After a quick BOF break, it was time to get back to the boot2roots. Next on my plate was the 3rd part on the Kioptrix series, Kioptrix Level 1.2 (#3) by loneferret. First up was netdiscover to find the IP of the new VM.
I decided to take a short break from the boot2root VMs and do a tutorial on a known vulnerable application, as well as the exploit development process for it. This won’t quite be a linear tutorial for buffer overflows though, as there is already a better one on Corelan, and I want to bounce around …
Well, next on my list (and reasonably so), was Kioptrix Level 1.2, again by loneferret, and still hosted on VulnHub. To start things off, I fired up netdiscover to find the IP of this new VM.