Cyborg Room Walkthrough

2024-11-17 3 min read TryHackMe Cyborg CTF OSINT Pentesting

Room Overview

Room URL: Cyborg

Room IP: 10.10.79.217 - This will be different for you.

Recon

We begin our reconnaissance phase by scanning the target using Nmap. This helps us identify the open ports and services running on the machine.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
Starting Nmap 7.60 ( https://nmap.org ) at 2024-10-28 16:28 GMT
Nmap scan report for ip-10-10-79-217.eu-west-1.compute.internal (10.10.79.217)
Host is up (0.018s latency).
Not shown: 998 closed ports
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 7.2p2 Ubuntu 4ubuntu2.10 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 db:b2:70:f3:07:ac:32:00:3f:81:b8:d0:3a:89:f3:65 (RSA)
|   256 68:e6:85:2f:69:65:5b:e7:c6:31:2c:8e:41:67:d7:ba (ECDSA)
|_  256 56:2c:79:92:ca:23:c3:91:49:35:fa:dd:69:7c:ca:ab (EdDSA)
80/tcp open  http    Apache httpd 2.4.18 ((Ubuntu))
|_http-server-header: Apache/2.4.18 (Ubuntu)
|_http-title: Apache2 Ubuntu Default Page: It works
MAC Address: 02:1F:A9:A5:69:89 (Unknown)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Nmap done: 1 IP address (1 host up) scanned in 8.96 seconds

Web Enumeration

Next, we perform directory enumeration using Gobuster to find hidden directories on the web server.

Continue reading

Exploring MSC Files in Windows

2024-11-10 5 min read Windows System Management

Understanding MSC Files and Their Uses

In Windows, MSC files are shortcuts that open specific Microsoft Management Consoles (MMC)—a centralized interface that allows administrators and advanced users to manage various system settings, resources, and services. Each MSC file provides quick access to a particular management tool, such as device management, security policies, or performance monitoring, without the need to navigate through the Control Panel or other menus.

Using MSC files has several advantages:

Continue reading

Understanding Login Types in Windows

2024-11-03 4 min read Windows Administration

Introduction

Windows operating systems offer various login types that define how users authenticate themselves and gain access to the system. Understanding these login types is crucial for both users and system administrators, as they impact security, access levels, and overall user experience in a Windows environment. In this blog post, we’ll explore the different types of logins in Windows, how to check which login type you are using, and how these types influence your permissions and capabilities within the operating system.

Continue reading

Why Ptyxis is a Game-Changer for Embedded Terminal Emulation

Why Ptyxis is a Game-Changer for Embedded Terminal Emulation

When you’re building applications that need terminal-like functionality, embedding a full terminal emulator can feel like overkill. Enter Ptyxis—a lightweight, versatile tool for integrating terminal emulation directly within your application. Here’s a breakdown of why Ptyxis might be the perfect fit for developers looking to add a terminal without the bloat.

What is Ptyxis?

Ptyxis is designed for embedding terminal emulation into applications, especially those built on GNOME or GTK. Rather than a one-size-fits-all terminal emulator, Ptyxis focuses on the essentials, delivering streamlined, customizable terminal functionality.

Continue reading

What's New in Nmap: A Look at the Latest Features

2024-10-27 3 min read Security Networking Tools

Introduction

The Nmap (Network Mapper) tool has long been a favorite among cybersecurity professionals and network administrators for its robust scanning capabilities. Whether you’re performing a network inventory, managing service upgrades, or simply checking for potential vulnerabilities, Nmap is an indispensable tool.

With the latest release (v7.95) released on 2024/April/23, Nmap continues to evolve, adding new features, improving performance, and expanding its capabilities. In this post, we’ll take a look at the most notable changes and enhancements that come with the latest version.

Continue reading

Improving DNF Update Speeds with max_parallel_downloads

2024-10-12 2 min read Linux Performance Package Management

When managing a Fedora or RHEL-based system, downloading updates can sometimes be time-consuming, especially when dealing with a slow network connection or multiple large packages or sometimes too many small packages 😀. By default, the DNF package manager downloads 1/3 package at a time, which can slow down the process. However, you can significantly improve download times by tweaking the max_parallel_downloads setting.

What is max_parallel_downloads?

max_parallel_downloads is a configuration option in DNF that controls how many packages are downloaded simultaneously during system updates. By increasing the number of parallel downloads, you can take full advantage of your available network bandwidth and reduce the overall time needed for downloading updates.

Continue reading

recover-disk-space

2024-10-05 4 min read Linux Storage Administration

Recovering Disk Space by Reducing Reserved Block Count on Linux

Introduction

In Linux systems, disk space management is crucial, especially when storage is running low. One often-overlooked aspect is the space reserved by the filesystem, known as reserved blocks. These blocks can consume a significant amount of disk space. In this post, we’ll explore what reserved blocks are, why they’re important, and how you can reduce the reserved block count to free up space.

Continue reading
Older posts Newer posts