<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Thursday-Snack on Shivasurya</title><link>http://shivasurya.me/categories/thursday-snack/</link><description>Recent content in Thursday-Snack on Shivasurya</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Fri, 24 Feb 2023 00:00:00 +0000</lastBuildDate><atom:link href="http://shivasurya.me/categories/thursday-snack/feed.xml" rel="self" type="application/rss+xml"/><item><title>HackTheBox Jerry Writeup - OSCP Practice</title><link>http://shivasurya.me/2023/02/24/hackthebox-jerry-writeup-oscp/</link><pubDate>Fri, 24 Feb 2023 00:00:00 +0000</pubDate><guid>http://shivasurya.me/2023/02/24/hackthebox-jerry-writeup-oscp/</guid><description>&lt;h3 id="quick-overview">Quick Overview&lt;/h3>
&lt;p>&lt;a href="https://app.hackthebox.com/machines/144">Jerry&lt;/a> is one of the Windows Box from &lt;a href="https://docs.google.com/spreadsheets/u/1/d/1dwSMIAPIam0PuRBkCiDI88pU3yzrqqHkDtBngUHNCw8/htmlview#">TJNull OSCP Practice list&lt;/a>. It&amp;rsquo;s one of those quite easy machine where you get initial foothold &amp;amp; privilege escalation in a single hop.&lt;/p>
&lt;p>&lt;img src="http://shivasurya.me/assets/media/htb-jerry-logo.jpg" alt="Jerry VM - HacktheBox Logo">&lt;/p>
&lt;h3 id="enumeration">Enumeration&lt;/h3>
&lt;h4 id="nmapautomator">NMapAutomator&lt;/h4>
&lt;p>Started with enumerating the target with &lt;a href="https://github.com/21y4d/nmapAutomator">&lt;code>NMapAutomator&lt;/code>&lt;/a> script since it helps in automating all possible ports with vulnerability scripts from &lt;code>nmap&lt;/code>. Additionally, &lt;code>NmapAutomator&lt;/code> can help in recon process using &lt;code>ffuf&lt;/code>, &lt;code>nikto&lt;/code>, &lt;code>DNSRecon&lt;/code>, &lt;code>SMB&lt;/code> enumeration.&lt;/p></description></item><item><title>HackTheBox Bashed Writeup - OSCP Practice List</title><link>http://shivasurya.me/2023/02/14/hackthebox-bashed-writeup-oscp/</link><pubDate>Tue, 14 Feb 2023 00:00:00 +0000</pubDate><guid>http://shivasurya.me/2023/02/14/hackthebox-bashed-writeup-oscp/</guid><description>&lt;h3 id="quick-overview">Quick Overview&lt;/h3>
&lt;p>&lt;a href="https://app.hackthebox.com/machines/118">Bashed&lt;/a> Box is one of the Linux Box from &lt;a href="https://docs.google.com/spreadsheets/u/1/d/1dwSMIAPIam0PuRBkCiDI88pU3yzrqqHkDtBngUHNCw8/htmlview#">TJNull OSCP Practice list&lt;/a>. It&amp;rsquo;s one of those quite easy machine where you get initial foothold in one hop and privilege escalation in second hop.&lt;/p>
&lt;p>&lt;img src="http://shivasurya.me/assets/media/htb-bashed-logo.jpg" alt="Bashed VM - HacktheBox Logo">&lt;/p>
&lt;h3 id="enumeration">Enumeration&lt;/h3>
&lt;h4 id="nmapautomator">NMapAutomator&lt;/h4>
&lt;p>Started with enumerating the target with &lt;a href="https://github.com/21y4d/nmapAutomator">&lt;code>NMapAutomator&lt;/code>&lt;/a> script since it helps in automating all possible ports with vulnerability scripts from &lt;code>nmap&lt;/code>. Additionally, &lt;code>NmapAutomator&lt;/code> can help in recon process using &lt;code>ffuf&lt;/code>, &lt;code>nikto&lt;/code>, &lt;code>DNSRecon&lt;/code>, &lt;code>SMB&lt;/code> enumeration.&lt;/p></description></item></channel></rss>