<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>jckhmr.net</title>
    <link>https://jckhmr.net/</link>
    <description>Recent content on jckhmr.net</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <lastBuildDate>Sun, 19 Apr 2020 00:37:23 +0000</lastBuildDate>
    
	<atom:link href="https://jckhmr.net/index.xml" rel="self" type="application/rss+xml" />
    
    
    <item>
      <title>Lazy Sysadmin Vulnhub Writeup</title>
      <link>https://jckhmr.net/lazy-sysadmin-vulnhub-writeup/</link>
      <pubDate>Sun, 19 Apr 2020 00:37:23 +0000</pubDate>
      
      <guid>https://jckhmr.net/lazy-sysadmin-vulnhub-writeup/</guid>
      <description>&amp;lsquo;Lazysysadmin&amp;rsquo; is another of the targets as recommended by the excellent TJnull, in preparation for the OSCP. Lazysysadmin is considered an &amp;lsquo;easy&amp;rsquo; machine. Just for fun, we&amp;rsquo;ll take a look at a number of different exploitation routes as well as take a look at some post-exploitation activities (specifically data exfiltration or exfil). Exfil would obviously be of interest to a Red Team operator who is more more &amp;lsquo;goal driven&amp;rsquo; and not so fixated on gaining root.</description>
    </item>
    
    <item>
      <title>Links</title>
      <link>https://jckhmr.net/links/</link>
      <pubDate>Tue, 24 Mar 2020 01:48:32 +0100</pubDate>
      
      <guid>https://jckhmr.net/links/</guid>
      <description>Just a flavor of the most commonly used references that spring to mind. I need to start a github repo for this &amp;hellip;
Twitter (just a few, in no particular order)  @SpecterOps @ZephrFish @hacks4pancakes @troyhunt @binitamshah @gossithedog  Websites (my current regular reads)  blog.zsec.uk - Andy Gill (a.k.a. &amp;lsquo;ZephrFish&amp;rsquo;) - very detailed content on a wide range of stuff from Red Team 101 through to &amp;lsquo;Learning the Ropes 101&amp;rsquo; stuff for those looking to get into the world of hacking.</description>
    </item>
    
    <item>
      <title>Tools</title>
      <link>https://jckhmr.net/tools/</link>
      <pubDate>Tue, 24 Mar 2020 01:48:32 +0100</pubDate>
      
      <guid>https://jckhmr.net/tools/</guid>
      <description>A few of the tools I have created &amp;hellip; some are just utilities that &amp;lsquo;do&amp;rsquo; something simple or make life simpler for me. Others are a bit more adventurous.
Hop on over to github for further details.</description>
    </item>
    
    <item>
      <title>Talks and presentations</title>
      <link>https://jckhmr.net/talks-and-presentations/</link>
      <pubDate>Tue, 24 Mar 2020 00:37:23 +0000</pubDate>
      
      <guid>https://jckhmr.net/talks-and-presentations/</guid>
      <description>Talks and presentations that I have given 2015  OWASP Belfast Meetup - October 1st, 2015: Mobile App Pentesting. [slides]  2017  OWASP Belfast Meetup - Mobile Pen Testing with a Wifi Pineapple  2019  BSides Belfast - Offensive Ansible for Red Teams [slides] [video]  2020  Newry NewTec 2020. A big shout out to Joe Mckevitt and Jonny Mullagh for having me! [event info] Robert Gordon University Aberdeen (Scotland), 11th March 2020- Cybersecurity Meetup: Automating Red Team Attack Infrastructure [slides] Robert Gordon University Aberdeen (Scotland), 12th March 2020 - Undergraduate talk: Hacking a career in Offensive Security [slides]  Image credit: Luis Quintero</description>
    </item>
    
    <item>
      <title>Create a Wordpress Webshell plugin</title>
      <link>https://jckhmr.net/create-a-wordpress-webshell-plugin/</link>
      <pubDate>Mon, 23 Mar 2020 00:37:23 +0000</pubDate>
      
      <guid>https://jckhmr.net/create-a-wordpress-webshell-plugin/</guid>
      <description>Webshells are a really useful stepping stone on the path to a proper reverse shell. The idea is that they use popular scripting based approaches such as PHP to accept some parameters in a GET request. That data then gets executed as a system level command - i.e. against the underlying operating system used by the web site.
The types of activity you can perform are dependent on the privileges associated with the account running the web server.</description>
    </item>
    
    <item>
      <title>Another hotel room safe with a default manufacturer reset code</title>
      <link>https://jckhmr.net/another-hotel-room-safe-with-a-default-manufacturer-reset-code/</link>
      <pubDate>Mon, 04 Nov 2019 00:37:23 +0000</pubDate>
      
      <guid>https://jckhmr.net/another-hotel-room-safe-with-a-default-manufacturer-reset-code/</guid>
      <description>Why is this sort of thing still happening? Finding a hotel room safe with a default code is not a particularly new security issue, which begs the question as to why it is still happening today if the issue is incredibly easy to fix. I encountered this issue recently when I had checked into a hotel.
After flicking through the TV I got bored and turned my attention to the hotel room safe.</description>
    </item>
    
    <item>
      <title>My BSides Belfast 2019 Talk: Offensive Ansible for Red teams Attack, Build, Learn</title>
      <link>https://jckhmr.net/my-bsides-belfast-2019-talk-offensive-ansible-for-red-teams-attack-build-learn/</link>
      <pubDate>Thu, 31 Oct 2019 14:43:23 +0000</pubDate>
      
      <guid>https://jckhmr.net/my-bsides-belfast-2019-talk-offensive-ansible-for-red-teams-attack-build-learn/</guid>
      <description>BSidesBelfast (October 31st 2019) was the first time that I actually presented at a major conference. I&amp;rsquo;ve been to quite a few other BSides events, but always as an attendee, never as a speaker. That all changed when I got the opportunity to present a talk on &amp;lsquo;Offensive Ansible for Red Teams - Attack, Build, Learn&amp;rsquo;.
 TL;DR: In this article I&amp;rsquo;ll talk about my overall experiences at BSides Belfast 2019 as well as give a brief overview of the talk I presented.</description>
    </item>
    
    <item>
      <title>Wintermute Part 2 Neuromancer (Vulnhub Writeup)</title>
      <link>https://jckhmr.net/wintermute-part-2-neuromancer-vulnhub-writeup/</link>
      <pubDate>Sun, 17 Feb 2019 11:05:48 +0000</pubDate>
      
      <guid>https://jckhmr.net/wintermute-part-2-neuromancer-vulnhub-writeup/</guid>
      <description>This VulnHub writeup is based on Neuromancer - part two of the excellent &amp;lsquo;Wintermute 1&amp;rsquo; challenge, created by creosote
I&amp;rsquo;ll spare you all the detail, but as a quick recap, after having rooted Straylight we find that it is dual-homed - i.e. it is part of a second sub-net. We pick up the action from the &amp;lsquo;note.txt&amp;rsquo; file found after having gained root privs on that box.
 TLDR/Spoiler Alert: The privesc route for this machine is not the obvious one chosen by other people who have taken the time to put together so many great writeups.</description>
    </item>
    
    <item>
      <title>Wintermute Part 1 Straylight (Vulnhub Writeup)</title>
      <link>https://jckhmr.net/wintermute-part-1-straylight-vulnhub-writeup/</link>
      <pubDate>Sun, 17 Feb 2019 10:59:58 +0000</pubDate>
      
      <guid>https://jckhmr.net/wintermute-part-1-straylight-vulnhub-writeup/</guid>
      <description>This VulnHub writeup is based on Straylight - part one of the excellent Wintermute 1 series found on Vulnhub, created by creosote. The Wintermute 1 series is designed to be similar to some of the challenges presented by the &amp;lsquo;OSCP&amp;rsquo; (Offensive Security Certified Professional) labs. Skills such as pivoting are really put to the test in the series, and it certainly ticked the box for me in terms of learning new stuff.</description>
    </item>
    
    <item>
      <title>Toppo Vulnhub Writeup</title>
      <link>https://jckhmr.net/toppo-vulnhub-writeup/</link>
      <pubDate>Sun, 14 Oct 2018 19:27:14 +0100</pubDate>
      
      <guid>https://jckhmr.net/toppo-vulnhub-writeup/</guid>
      <description>I&amp;rsquo;ve recently been approached to help introduce some new folk to the wonderful world of ethical hacking. The assumption is that they may know about the basic theory behind the stages of rooting a target, but have little by way of hands-on experience.
Ideally I want to do something that can be completed in a group scenario where everyone can play along and achieve root in a couple of hours tops.</description>
    </item>
    
    <item>
      <title>Stapler Vulnhub Writeup</title>
      <link>https://jckhmr.net/stapler-vulnhub-writeup/</link>
      <pubDate>Sun, 14 Oct 2018 19:14:11 +0100</pubDate>
      
      <guid>https://jckhmr.net/stapler-vulnhub-writeup/</guid>
      <description>&amp;lsquo;Stapler&amp;rsquo; is the second machine from Vulnhub.com that I looked at as part of my OSCP preparations. This one just requires good enumeration skills and leaving no stone unturned. This is a lesson I learned after discovering two different ways for privesc. I had been reading other writeups on this box and then I learned a third way of compromising this machine. I obviously hadn&amp;rsquo;t read notes posted on Vulnhub by the author, and neither did I pay FULL attention to the output from my enumeration tools.</description>
    </item>
    
    <item>
      <title>Fristileaks Vulnhub Writeup</title>
      <link>https://jckhmr.net/fristileaks-vulnhub-writeup/</link>
      <pubDate>Mon, 17 Sep 2018 21:32:38 +0100</pubDate>
      
      <guid>https://jckhmr.net/fristileaks-vulnhub-writeup/</guid>
      <description>&amp;lsquo;Fristileaks&amp;rsquo; is the first of my efforts to exploit Vulnhub.com machines as part of my OSCP preparations. I needed some additional machines to help fine tune my methodology to do things as &amp;lsquo;surgically&amp;rsquo; as possible without getting stuck down pointless rabbit holes. I love reading the stuff from abatchy and I decided to get stuck into their recommendations for &amp;lsquo;OSCP-like Vulnhub VMs&amp;rsquo;
I like to go into lots of (hopefully) useful detail in a progressive manner, starting with an overview and then getting more into the nuts and bolts.</description>
    </item>
    
    <item>
      <title>About jckhmr</title>
      <link>https://jckhmr.net/about/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>https://jckhmr.net/about/</guid>
      <description>If you found this, five points for beginning your OSINT journey about me. :-)
Over 15 years ago, I moved into information security, having worked in web and &amp;lsquo;new media&amp;rsquo;. I started out with technical writing, providing secure coding training for devs, which then evolved into a security architect role, before becoming an application security pen tester. On the latter, I specialized a lot in mobile, delving into things such as encryption for mobile apps.</description>
    </item>
    
  </channel>
</rss>