Bypassing DEP with VirtualProtect (x86)
xct2022-07-12T06:15:05+00:00In the last post we explored how to exploit the rainbow2.exe binary from the vulnbins repository using WriteProcessMemory & the "skeleton" method. Now we are going to explore how to use VirtualProtect and instead of setting up the arguments on the stack with dummy values and then replacing them, we...
Bypassing DEP with WriteProcessMemory (x86)
xct2022-07-12T06:14:37+00:00In this post I will show an example on how to bypass DEP with WriteProcessMemory. This is a bit more complicated than doing it with VirtualProtect but nonetheless an interesting technical challenge. For the target binary I will use rainbow2.exe from my vulnbins repository.
ASP, Windows Containers, Responder & NoPAC – Anubis @ HackTheBox
xct2022-06-14T08:23:04+00:00We are solving Anubis, a 50-point windows machine on HackTheBox which involves an ASP template injection, windows containers, and stealing hashes with Responder. Later we'll escalate privileges using noPAC.
SSRF & Python Debugger – Forge @ HackTheBox
xct2022-06-14T08:30:23+00:00We are solving Forge, a medium difficulty Linux machine on HackTheBox which involves an SSRF & playing with the python debugger.
Lab – Baby Walkthrough
xct2023-07-31T17:34:53+00:00Baby is an easy machine on Vulnlab that involves enumerating LDAP & spraying credentials. For SYSTEM we exploit SeBackup & SeRestore Privileges.
Lab – Rainbow Walkthrough
xct2023-01-07T10:44:35+00:00Rainbow is a medium difficulty machine that involves a SEH-based buffer overflow for user and a UAC bypass for root.