Main public logs
From Pessin randon wiki
Combined display of all available logs of Pessin randon wiki. You can narrow down the view by selecting a log type, the username (case-sensitive), or the affected page (also case-sensitive).
- 17:04, 16 October 2022 Exf talk contribs uploaded File:Version.png
- 17:04, 16 October 2022 Exf talk contribs created page File:DNS enum.png
- 17:04, 16 October 2022 Exf talk contribs uploaded File:DNS enum.png
- 08:34, 15 October 2022 192.168.110.1 talk created page Version (Created page with "==='''Description'''=== Scan the IP 10.110.163.105 Answer the question about services. 50 pts ===Question=== What is the version number of the service running on port 86/tcp ===Solution=== Used nmap command to see what service runs on port 86 '''sudo nmap -sV -p 86 10.110.163.105''' ===Flag=== 2.4.52") Tag: Visual edit
- 08:24, 15 October 2022 192.168.110.1 talk created page DNS Enum (Created page with "=== '''Description''' === You have been recruited to conduct audit on company DNS server. You must find out if any internal DNS records are exposed to the public. 80 pts === Question === Conducting DNS enumeration activities to see if you can find anything interesting. Domain to enumerate is dns.ctf P.S. When you find the flag, it's obvious :) === Solution === I performed DNS enumeration as requested: '''dnsrecon -d dns.ctf''' The flag was there. === Flag === ctft...") Tag: Visual edit
- 15:14, 13 October 2022 Exf talk contribs created page File:Sshd config.PNG
- 15:14, 13 October 2022 Exf talk contribs uploaded File:Sshd config.PNG
- 15:14, 13 October 2022 Exf talk contribs created page File:Chmod-and-connection.PNG
- 15:14, 13 October 2022 Exf talk contribs uploaded File:Chmod-and-connection.PNG
- 15:14, 13 October 2022 Exf talk contribs created page File:Ssh-copy-id.PNG
- 15:14, 13 October 2022 Exf talk contribs uploaded File:Ssh-copy-id.PNG
- 15:14, 13 October 2022 Exf talk contribs created page File:Ssh-wget.PNG
- 15:14, 13 October 2022 Exf talk contribs uploaded File:Ssh-wget.PNG
- 15:14, 13 October 2022 Exf talk contribs created page File:Ssh-Task.PNG
- 15:14, 13 October 2022 Exf talk contribs uploaded File:Ssh-Task.PNG
- 15:13, 13 October 2022 Exf talk contribs created page SSH-Harden (Created page with "===Description=== During regular system audits, it was dicovered that one of the systems does not meet the organization security baseline. Thereforce this system must be hardened. 200pts ===Question=== Harden the SSH configuration so that it meets the baseline. *Make sure that root login is disabled *Disable password authentication Add this [public key] so that the user: sysadmin is able to log in with their [private key] ===Solution=== To be on the safe side, I initi...")
- 13:59, 13 October 2022 Exf talk contribs created page File:Encoded-flag.PNG
- 13:59, 13 October 2022 Exf talk contribs uploaded File:Encoded-flag.PNG
- 13:58, 13 October 2022 Exf talk contribs created page File:Encoded-task.PNG
- 13:58, 13 October 2022 Exf talk contribs uploaded File:Encoded-task.PNG
- 13:58, 13 October 2022 Exf talk contribs created page Encoder (Created page with "===Description=== This web application allows you to use coding utility to encode and decode base64 100pts ===Question=== Investigate the application, exploit the vulnerability and read the flag from /var/backup/secret.txt ===Solution=== First, I ran a vulnerability scan on the website with the ZAP tool. Unfortunately, nothing was found. Next I tried to enter all kind of commands to both decoder and encoder sides. I realized that especiality I got errors from decoding...")
- 13:41, 13 October 2022 Exf talk contribs created page File:Exiftool-task.PNG
- 13:41, 13 October 2022 Exf talk contribs uploaded File:Exiftool-task.PNG
- 13:41, 13 October 2022 Exf talk contribs created page File:Exiftool-flag.PNG
- 13:41, 13 October 2022 Exf talk contribs uploaded File:Exiftool-flag.PNG
- 13:40, 13 October 2022 Exf talk contribs created page File:Netcat.PNG
- 13:40, 13 October 2022 Exf talk contribs uploaded File:Netcat.PNG
- 13:40, 13 October 2022 Exf talk contribs created page File:Metasploit2.PNG
- 13:40, 13 October 2022 Exf talk contribs uploaded File:Metasploit2.PNG
- 13:40, 13 October 2022 Exf talk contribs created page Nexif (Created page with "===Description=== Test the security of this online Exiftool service. ===Question=== Can you find the vulnerability and exploit it? Can you find the flag from the home folder. ===Solution=== Since the mission description talks about vulnerability and exploits. It is thereforce worth looking to see if there are ready exploits in Metasploit. I started the Metasploit and searched for exiftools as a keyword and immediately found an interesting exploit. <code>ExifTool DjVu...") Tag: Visual edit: Switched
- 13:28, 13 October 2022 Exf talk contribs created page File:Metasploit1.PNG
- 13:28, 13 October 2022 Exf talk contribs uploaded File:Metasploit1.PNG
- 13:15, 13 October 2022 Exf talk contribs created page File:000-config.PNG
- 13:15, 13 October 2022 Exf talk contribs uploaded File:000-config.PNG
- 11:48, 30 September 2022 Exf talk contribs created page File:Plog-flag.PNG
- 11:48, 30 September 2022 Exf talk contribs uploaded File:Plog-flag.PNG
- 11:47, 30 September 2022 Exf talk contribs created page File:Blog-task+flag.png
- 11:47, 30 September 2022 Exf talk contribs uploaded File:Blog-task+flag.png
- 11:35, 30 September 2022 Exf talk contribs created page File:User-audit-flag.PNG
- 11:35, 30 September 2022 Exf talk contribs uploaded File:User-audit-flag.PNG
- 11:35, 30 September 2022 Exf talk contribs created page File:User-audit-task.PNG
- 11:35, 30 September 2022 Exf talk contribs uploaded File:User-audit-task.PNG
- 11:24, 30 September 2022 Exf talk contribs created page File:Top-secret-task.PNG
- 11:24, 30 September 2022 Exf talk contribs uploaded File:Top-secret-task.PNG
- 11:19, 30 September 2022 Exf talk contribs created page Top-Secret (Created page with "===Description=== Management found out that the highly sensitive and top secret documents are accessible to all! They must be hidden ASAP! 150pts ===Task=== You must protect this apache web server with authentication! Configure basic authentication to protect the page Use these credentials for auth: Username: mulder Password: Scully-th3-b3st! SSH Access: Hostname: target.... Username: user Password: Cool2Pass ===Solution=== The first thing I did was to make a...")
- 11:04, 30 September 2022 Exf talk contribs created page File:Crackstation-password-dump.PNG
- 11:04, 30 September 2022 Exf talk contribs uploaded File:Crackstation-password-dump.PNG
- 11:03, 30 September 2022 Exf talk contribs created page File:Password-dump-task.PNG
- 11:03, 30 September 2022 Exf talk contribs uploaded File:Password-dump-task.PNG
- 11:03, 30 September 2022 Exf talk contribs created page Password dump (Created page with "===Description=== Our username and password database was breached. Luckily all the passwords were hashed. *Different hashes - check image *Different hashes - check image *Different hashes - check image 70pts ===Question=== Would it still be possible to recover a password for some users? For the flag, post the recovered password ===Solution=== I recognised that it is probably an MD5 hash, which is crackable. However, I decided to try a crackstation website with a data...")