<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Oscp-Writeups on Shivasurya</title><link>http://shivasurya.me/categories/oscp-writeups/</link><description>Recent content in Oscp-Writeups on Shivasurya</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Fri, 17 Mar 2023 00:00:00 +0000</lastBuildDate><atom:link href="http://shivasurya.me/categories/oscp-writeups/feed.xml" rel="self" type="application/rss+xml"/><item><title>HackTheBox Active Writeup - Active Directory - OSCP Practice</title><link>http://shivasurya.me/2023/03/17/hackthebox-active-writeup-oscp-active-directory/</link><pubDate>Fri, 17 Mar 2023 00:00:00 +0000</pubDate><guid>http://shivasurya.me/2023/03/17/hackthebox-active-writeup-oscp-active-directory/</guid><description>&lt;h3 id="quick-overview">Quick Overview&lt;/h3>
&lt;p>&lt;a href="https://app.hackthebox.com/machines/Active">Active&lt;/a> is one of the easy Active Directory focused Windows Box from &lt;a href="https://docs.google.com/spreadsheets/u/1/d/1dwSMIAPIam0PuRBkCiDI88pU3yzrqqHkDtBngUHNCw8/htmlview#">TJNull OSCP Practice list&lt;/a>. It&amp;rsquo;s one of those easy machine where you get initial foothold via SMB &lt;code>Replication&lt;/code> share leak &amp;amp; escalate privileges using Active Directory weakness.&lt;/p>
&lt;p>&lt;img src="http://shivasurya.me/assets/media/htb-active-logo.png" alt="Active VM - HacktheBox Logo">&lt;/p>
&lt;h3 id="enumeration">Enumeration&lt;/h3>
&lt;h4 id="nmapautomator">NMapAutomator&lt;/h4>
&lt;p>Started with enumerating the target with &lt;a href="https://github.com/21y4d/nmapAutomator">&lt;code>NMapAutomator&lt;/code>&lt;/a> script since it helps in automating all possible ports with vulnerability scripts from &lt;code>nmap&lt;/code>. Additionally, &lt;code>NmapAutomator&lt;/code> can help in recon process using &lt;code>smbmap&lt;/code>, &lt;code>ffuf&lt;/code>, &lt;code>nikto&lt;/code>, &lt;code>DNSRecon&lt;/code>, &lt;code>SMB&lt;/code> enumeration.&lt;/p></description></item><item><title>HackTheBox Jerry Writeup - OSCP Practice</title><link>http://shivasurya.me/2023/02/24/hackthebox-jerry-writeup-oscp/</link><pubDate>Fri, 24 Feb 2023 00:00:00 +0000</pubDate><guid>http://shivasurya.me/2023/02/24/hackthebox-jerry-writeup-oscp/</guid><description>&lt;h3 id="quick-overview">Quick Overview&lt;/h3>
&lt;p>&lt;a href="https://app.hackthebox.com/machines/144">Jerry&lt;/a> is one of the Windows Box from &lt;a href="https://docs.google.com/spreadsheets/u/1/d/1dwSMIAPIam0PuRBkCiDI88pU3yzrqqHkDtBngUHNCw8/htmlview#">TJNull OSCP Practice list&lt;/a>. It&amp;rsquo;s one of those quite easy machine where you get initial foothold &amp;amp; privilege escalation in a single hop.&lt;/p>
&lt;p>&lt;img src="http://shivasurya.me/assets/media/htb-jerry-logo.jpg" alt="Jerry VM - HacktheBox Logo">&lt;/p>
&lt;h3 id="enumeration">Enumeration&lt;/h3>
&lt;h4 id="nmapautomator">NMapAutomator&lt;/h4>
&lt;p>Started with enumerating the target with &lt;a href="https://github.com/21y4d/nmapAutomator">&lt;code>NMapAutomator&lt;/code>&lt;/a> script since it helps in automating all possible ports with vulnerability scripts from &lt;code>nmap&lt;/code>. Additionally, &lt;code>NmapAutomator&lt;/code> can help in recon process using &lt;code>ffuf&lt;/code>, &lt;code>nikto&lt;/code>, &lt;code>DNSRecon&lt;/code>, &lt;code>SMB&lt;/code> enumeration.&lt;/p></description></item><item><title>HackTheBox OSCP Writeups - Shivasurya.me</title><link>http://shivasurya.me/2023/02/20/hackthebox-oscp-writeups/</link><pubDate>Mon, 20 Feb 2023 00:00:00 +0000</pubDate><guid>http://shivasurya.me/2023/02/20/hackthebox-oscp-writeups/</guid><description>&lt;h3 id="quick-overview">Quick Overview&lt;/h3>
&lt;p>This blog post acts as Index of &lt;a href="https://docs.google.com/spreadsheets/u/1/d/1dwSMIAPIam0PuRBkCiDI88pU3yzrqqHkDtBngUHNCw8/htmlview#">TJNull HackTheBox OSCP Practice list&lt;/a>. I myself enjoyed solving all those HackTheBox VM and started writing writeups to help other folks out there striving hard to crack OSCP exam 🎮&lt;/p>
&lt;h3 id="index">Index&lt;/h3>
&lt;iframe class="airtable-embed" src="https://airtable.com/embed/shrt27NGHECI0l8yL?backgroundColor=orange&amp;viewControls=on" frameborder="0" onmousewheel="" width="100%" height="533" style="background: transparent; border: 1px solid #ccc;">&lt;/iframe>
&lt;h3 id="closing-note">Closing Note:&lt;/h3>
&lt;p>I hope this post is helpful for folks preparing for Offensive Security Certified Professional certification exam. For bugs,hugs &amp;amp; discussion, DM in &lt;a href="https://twitter.com/sshivasurya">Twitter&lt;/a>. Opinions are my own and not the views of my employer.&lt;/p></description></item><item><title>HackTheBox Bashed Writeup - OSCP Practice List</title><link>http://shivasurya.me/2023/02/14/hackthebox-bashed-writeup-oscp/</link><pubDate>Tue, 14 Feb 2023 00:00:00 +0000</pubDate><guid>http://shivasurya.me/2023/02/14/hackthebox-bashed-writeup-oscp/</guid><description>&lt;h3 id="quick-overview">Quick Overview&lt;/h3>
&lt;p>&lt;a href="https://app.hackthebox.com/machines/118">Bashed&lt;/a> Box is one of the Linux Box from &lt;a href="https://docs.google.com/spreadsheets/u/1/d/1dwSMIAPIam0PuRBkCiDI88pU3yzrqqHkDtBngUHNCw8/htmlview#">TJNull OSCP Practice list&lt;/a>. It&amp;rsquo;s one of those quite easy machine where you get initial foothold in one hop and privilege escalation in second hop.&lt;/p>
&lt;p>&lt;img src="http://shivasurya.me/assets/media/htb-bashed-logo.jpg" alt="Bashed VM - HacktheBox Logo">&lt;/p>
&lt;h3 id="enumeration">Enumeration&lt;/h3>
&lt;h4 id="nmapautomator">NMapAutomator&lt;/h4>
&lt;p>Started with enumerating the target with &lt;a href="https://github.com/21y4d/nmapAutomator">&lt;code>NMapAutomator&lt;/code>&lt;/a> script since it helps in automating all possible ports with vulnerability scripts from &lt;code>nmap&lt;/code>. Additionally, &lt;code>NmapAutomator&lt;/code> can help in recon process using &lt;code>ffuf&lt;/code>, &lt;code>nikto&lt;/code>, &lt;code>DNSRecon&lt;/code>, &lt;code>SMB&lt;/code> enumeration.&lt;/p></description></item></channel></rss>