Oct 22Solving Game of Active Directory (GOAD) by Orange Cyberdefense Part-2LLMNR and NBT-NS Poisoning LLMNR (Link-Local Multicast Name Resolution) poisoning, also known as NBT-NS (NetBIOS Name Service) poisoning, is a network attack that involves the manipulation or interception of DNS-like name resolution requests within a local network. This attack targets the way Windows devices attempt to resolve hostnames to IP…Red Team3 min readRed Team3 min read
Oct 11Solving Game of Active Directory (GOAD) by Orange Cyberdefense Part-1crackmapexec smb live_hostsActive Directory3 min readActive Directory3 min read
Sep 3Installing and Solving Kubegoat in Kubernetes cluster running on VMs.Welcome to this blog post on “Installing Kubegoat in a Kubernetes cluster running on VMs.” In this post, we will walk through the steps of installing Kubegoat, a tool designed to simulate real-world Kubernetes cluster misconfigurations and vulnerabilities, in a Kubernetes cluster running on virtual machines. In addition to installing…Kubernetes5 min readKubernetes5 min read
Aug 16Deploying Kubernetes ClusterWhile using a managed Kubernetes service like EKS or GKE provides simplicity, understanding how to manually build a Kubernetes cluster from scratch is valuable for really comprehending how Kubernetes works under the hood. …Kubernetes10 min readKubernetes10 min read
Jun 27bigiamchallenge AWS IAM ChallengesWelcome to my blog! In this post, I’ll be sharing my solutions to the challenges presented by bigiamchallenge.com. The Big IAM Challenge is an online CTF (Capture the Flag) event that tests participants’ knowledge of AWS IAM (Identity and Access Management). The challenge consists of six objectives that highlight common…AWS7 min readAWS7 min read
Jun 10flaws2.cloud (Level 2)Level 2(http://level2-g9785tw8478k4awxtbox9kk3c5ka8iiz.flaws2.cloud/) a) We start with a web application running inside a container @ http://container.target.flaws2.cloud/ which requires us to authenticate with a username and password which we don’t possess. We have been provided an ecr (Elastic Container Registry) name- level2 b) Listing out images in the registry with our creds…AWS3 min readAWS3 min read
May 9flaws2.cloud (Level 1)Level 1 (http://level1.flaws2.cloud/) — a) We are provided with a form that intakes digits only. Upon checking we came to know that validation is being performed only on the client side using javascript. This can be verified by viewing the HTML source of the page. Method validateForm() is performing this validation. b) We can…AWS3 min readAWS3 min read
Feb 15AWSGoat(ine) AWS CTF solution Module 2Overview/Agenda - Exploiting SQLi for login bypass - Finding and Abusing file upload functionality to upload web shell - Getting a reverse shell using python3 payload and listening using pwncat - Finding DB creds in config file - Finding out that we are in a container - Enumerating container using linpeas - Finding out processes of…AWS10 min readAWS10 min read
Jan 31Creating a pdf merger Web Application using chatgpt AIHi readers, recently I was filling up an online form and it was required to merge, upload and submit documents in pdf format. Usually, I tend to use free online tools for merging pdfs(like ilovepdf, etc). But this time the files which I was uploading contained PII and financial information…Artificial Intelligence3 min readArtificial Intelligence3 min read
Jan 8Persistence ways(The adversary is trying to maintain their foothold)Gaining continued access to a computer system or network that has been compromised is known as persistence. It requires bypassing security measures and re-configuring systems so that access is maintained even after users log out or reboot the system. …Persistence6 min readPersistence6 min read