Posts

Search ๐Ÿ”Ž๐Ÿ–ฅ️

TryHackMe|Brute It WriteUp\Walkthrough (Arabic)

Image
ุจุณู… ุงู„ู„ู‡ ุงู„ู„ูŠ ูŠุจุบู‰ ูŠุดูˆู ุงู„ุญู„ ู…ุดุฑูˆุญ ููŠุฏูŠูˆ ูŠุฑุฌุน ู„ู„ููŠุฏูŠูˆ ุนู„ู‰ ู‚ู†ุงุชูŠ ุจุงู„ูŠูˆุชูŠูˆุจ ุนู„ู‰ ู‡ุฐุง ุงู„ุฑุงุจุท: ุฑุงุจุท ุงู„ุชุญุฏูŠ:  https://tryhackme.com/r/room/bruteit ==================================================== ูƒู„ู…ุฉ IP ููŠ ูƒู„ ุงู„ูƒูˆู…ุงู†ุฏุฒ ุงู„ู„ูŠ ุฃูƒุชุจู‡ุง ุชُุณุชุจุฏู„ ุจุงู„ู€IP ู„ู„ู…ุดูŠู† ุญู‚ุชูƒู… ุนู„ู‰ TryHackMe ุฃูˆู„ ุญุงุฌุฉ ู†ุดุบู„ ุงู„ู€machine ูˆู†ุชุฃูƒุฏ ุฅู†ู†ุง ุงุชุตู„ู†ุง ุจุดุจูƒุฉ TryHackMe ูˆุงู„ุงุชุตุงู„ ู…ุถุจูˆุท، ุจุนุฏูŠู† ู†ุจุฏุฃ ุจุฃูˆู„ ุฎุทูˆุฉ ู„ู„ุญู„ ูˆู‡ูŠ ุฅู†ู†ุง ู†ุณูˆูŠ scan ู„ู„ุดุจูƒุฉ ุจุงุณุชุฎุฏุงู… nmap sudo nmap IP -vv ุทู„ุน ู…ุนุงู†ุง ุจูˆุฑุช 22 ูˆุจูˆุฑุช 80 ู†ุฑุฌุน ู†ุณูˆูŠ Aggressive ุณูƒุงู† ุนู„ู‰ ู†ูุณ ู‡ุฐู‡ ุงู„ุจูˆุฑุชุงุช sudo nmap IP -vv -A -p 80,22 ุนู„ู‰ ุจูˆุฑุช 22 ุนู†ุฏู†ุง SSH server ูˆู†ุธุงู… ุงู„ุฌู‡ุงุฒ ู‡ูˆ Ubuntu Linux، ูˆุนู„ู‰ ุจูˆุฑุช 80 ุนู†ุฏู†ุง Apache server ุจู†ุจุญุซ ุนู† ุงู„ู…ุณุงุฑุงุช ุงู„ู…ูˆุฌูˆุฏุฉ ุนู„ู‰ ุจูˆุฑุช 80 ุจุงุณุชุฎุฏุงู… gobuster gobuster dir -w /usr/share/dirb/wordlists/common.txt -u htttp://IP/ -t 64 ุทู„ุน ู…ุนุงู†ุง ุงู„ู…ุณุงุฑ admin ู†ุฑูˆุญ ู„ู‡ ููŠ ุงู„ู…ุชุตูุญ، ูˆุจูŠุทู„ุน ู…ุนุงู†ุง ุตูุญุฉ ุชุณุฌูŠู„ ุฏุฎูˆู„، ู„ูƒู† ู…ุง ุนู†ุฏู†ุง ู…ุนู„ูˆู…ุงุช ู„ู„ุฏุฎูˆู„، ู„ุฐู„ูƒ ุจู†ุณูˆูŠ brute force، ู„ูƒู† ุจู†ุฎู„ูŠ ุงุณู… ุงู„ู…ุณุชุฎุฏู… ุงู„ู„ูŠ ู†ุฌุฑุจ ุนู„ูŠู‡ ูู‚ุท admin، ู„ุฃู† ุบุงู„ุจุง ุจูŠูƒูˆู† ุนู†ุฏูŠ ู…ุณุชุฎุฏู… ุงุณู…ู‡ admin، ุจุฏู„ ู…ุง ู†ุฌุฑุจ ุขู„ุงู ุฃุณู…ุงุก ุง...

TryHackMe|Brute It WriteUp\Walkthrough (English)

Image
Brute It Room Link:  https://tryhackme.com/r/room/bruteit ============================================================= sudo nmap IP -Pn . You have 22,80 ports open. Run Nmap with -sV to see the versions for both. To know the version of the Linux distribution you can look at the results from the Nmap’s scan on the target for both SSH and Apache services Ubuntu . The page on the browser is just the default page for Apache. To get the hidden folder gobuster dir -w /usr/share/dirb/wordlists/common.txt -u http://IP -r , the hidden folder is /admin. Which is a login form. As it is an admin panel, it is most likely that the username is admin. To get the password intercept the login page using burpsuite to easily fill the blanks in your brute force using Hydra, also try login with invalid credentials to get the error message to be able to put it in your attack. sudo hydra -l admin -P /usr/share/wordlists/rockyou.txt IP http-post-form "/admin/:user=admin&pass=^PASS^:Username or passwo...

TryHackMe|Gallery WriteUp\Walkthrough (Arabic)

Image
ุจุณู… ุงู„ู„ู‡ ุงู„ู„ูŠ ูŠุจุบู‰ ูŠุดูˆู ุงู„ุญู„ ู…ุดุฑูˆุญ ููŠุฏูŠูˆ ูŠุฑุฌุน ู„ู„ููŠุฏูŠูˆ ุนู„ู‰ ู‚ู†ุงุชูŠ ุจุงู„ูŠูˆุชูŠูˆุจ ุนู„ู‰ ู‡ุฐุง ุงู„ุฑุงุจุท: ุฑุงุจุท ุงู„ุชุญุฏูŠ: https://tryhackme.com/r/room/gallery666 ==================================================== ูƒู„ู…ุฉ IP ููŠ ูƒู„ ุงู„ูƒูˆู…ุงู†ุฏุฒ ุงู„ู„ูŠ ุฃูƒุชุจู‡ุง ุชُุณุชุจุฏู„ ุจุงู„ู€IP ู„ู„ู…ุดูŠู† ุญู‚ุชูƒู… ุนู„ู‰ TryHackMe ุฃูˆู„ ุญุงุฌุฉ ู†ุดุบู„ ุงู„ู€machine ูˆู†ุชุฃูƒุฏ ุฅู†ู†ุง ุงุชุตู„ู†ุง ุจุดุจูƒุฉ TryHackMe ูˆุงู„ุงุชุตุงู„ ู…ุถุจูˆุท، ุจุนุฏูŠู† ู†ุจุฏุฃ ุจุฃูˆู„ ุฎุทูˆุฉ ู„ู„ุญู„ ูˆู‡ูŠ ุฅู†ู†ุง ู†ุณูˆูŠ scan ู„ู„ุดุจูƒุฉ ุจุงุณุชุฎุฏุงู… nmap sudo nmap IP -vv ุทู„ุน ู…ุนุงู†ุง ุจูˆุฑุช 80 ูˆ 8080، ู†ุฑุฌุน ู†ุณูˆูŠ Aggressive ุณูƒุงู† ุนู„ู‰ ู†ูุณ ู‡ุฐู‡ ุงู„ุจูˆุฑุชุงุช sudo nmap IP -vv -A -p 80,8080 ุงู„ุจูˆุฑุช 80 ูˆ 8080 ูƒู„ู‡ุง ุนู„ูŠู‡ุง Apache server ู†ุฑูˆุญ ู„ู„ู…ุชุตูุญ ูˆู†ุฒูˆุฑ ุงู„ุจูˆุฑุชุงุช، ุจูˆุฑุช 8080 ุชุนุทูŠู†ุง ุตูุญุฉ ุชุณุฌูŠู„ ุฏุฎูˆู„، ุฃู…ุง ุจูˆุฑุช 80 ุนู†ุฏู†ุง ุงู„ุตูุญุฉ ุงู„ุฑุฆูŠุณูŠุฉ ู„ุฃุจุงุชุดูŠ ุณูŠุฑููŠุฑ.  ู†ุฑุฌุน ู„ุตูุญุฉ ุชุณุฌูŠู„ ุงู„ุฏุฎูˆู„، ูˆู†ุดูˆู ู„ูˆ ูŠุถุจุท ู…ุนุงู‡ุง SQL injection، ูˆุงู„ู„ูŠ ู‡ูˆ ุฅู†ู†ุง ู†ุฏุฎู„ ููŠ ุฎุงู†ุฉ ุงุณู… ุงู„ู…ุณุชุฎุฏู…  ' or '1'='1' -- - ุซู… ู†ุญุท ุฃูŠ ูƒู„ู…ุฉ ุณุฑ، ุจุนุฏ ูƒุฐุง ู†ุณูˆูŠ sign in، ูˆุจูŠุถุจุท ู…ุนุงู†ุง، ู…ุนู†ุงุชู‡ ุฅู† ู‡ุฐู‡ ุงู„ุตูุญุฉ vulnerable to SQLi.  ุฃูˆู„ ู…ุง ู†ุฏุฎู„ ุจูŠุทู„ุน ู…ุนุงู†ุง ุงู„ุตูุญุฉ ุงู„ุฑุฆูŠุณูŠุฉ ูˆุจุฏุงุฎู„ู‡ุง ุฃู„ุจูˆู…ุงุช ูˆุตูˆุฑ. ูˆุจุฑุถูˆ ููŠ...

TryHackMe|Gallery WriteUp\Walkthrough (English)

Image
Gallery Room Link:  https://tryhackme.com/r/room/gallery666 ================================================================ After the Nmap scan, you will see 2 ports open 80 and 8080. 8080 doesn’t have anything interesting. In 80 the main page has the home page for nginx server. Use gobuster to find any hidden directories. There is /gallery . In /gallery you have a login page. Try to see if sqli works on it.  Enter "  ‘ or ‘1’ = ‘1’ -- - "   in the username field and see if it allows you to get in, and it did :). Once you are in you can answer the second question which is the CMS, the website uses Simple Image Gallery. Although there is a known vulnerability for this, you don’t need it. Go to albums from the top horizontal menu. Then, click on any of the albums and upload a .php webshell, I used the one from pentestmonkey. Do not forget to change the IP into your IP and set up a netcat listener with the same port number as in the shell. Once you have your webshel...

TryHackMe|CMSpit WriteUp\Walkthrough (Arabic)

Image
ุจุณู… ุงู„ู„ู‡ ุงู„ู„ูŠ ูŠุจุบู‰ ูŠุดูˆู ุงู„ุญู„ ู…ุดุฑูˆุญ ููŠุฏูŠูˆ ูŠุฑุฌุน ู„ู„ููŠุฏูŠูˆ ุนู„ู‰ ู‚ู†ุงุชูŠ ุจุงู„ูŠูˆุชูŠูˆุจ ุนู„ู‰ ู‡ุฐุง ุงู„ุฑุงุจุท: ุฑุงุจุท ุงู„ุชุญุฏูŠ:  https://tryhackme.com/r/room/cmspit ================================================================= ูƒู„ู…ุฉ IP ููŠ ูƒู„ ุงู„ูƒูˆู…ุงู†ุฏุฒ ุงู„ู„ูŠ ุฃูƒุชุจู‡ุง ุชُุณุชุจุฏู„ ุจุงู„ู€IP ู„ู„ู…ุดูŠู† ุญู‚ุชูƒู… ุนู„ู‰ TryHackMe ุฃูˆู„ ุญุงุฌุฉ ู†ุดุบู„ ุงู„ู€machine ูˆู†ุชุฃูƒุฏ ุฅู†ู†ุง ุงุชุตู„ู†ุง ุจุดุจูƒุฉ TryHackMe ูˆุงู„ุงุชุตุงู„ ู…ุถุจูˆุท، ุจุนุฏูŠู† ู†ุจุฏุฃ ุจุฃูˆู„ ุฎุทูˆุฉ ู„ู„ุญู„ ูˆู‡ูŠ ุฅู†ู†ุง ู†ุณูˆูŠ scan ู„ู„ุดุจูƒุฉ ุจุงุณุชุฎุฏุงู… nmap sudo nmap IP -vv ุทู„ุน ู…ุนุงู†ุง ุจูˆุฑุชูŠู† 22 ูˆ 80، ู†ุฑุฌุน ู†ุณูˆูŠ Aggressive ุณูƒุงู† ุนู„ู‰ ู†ูุณ ู‡ุฐู‡ ุงู„ุจูˆุฑุชุงุช sudo nmap IP -vv -A -p 80,22 ุจูˆุฑุช 22 ุนู„ูŠู‡ุง SSH ูˆุงู„ู†ุธุงู… ู‡ูˆ ubuntu، ูˆุนู„ู‰ ุจูˆุฑุช 80 ุนู†ุฏู†ุง Apache server.  ุจู†ุฑูˆุญ ู„ู„ู…ุชุตูุญ ูˆู†ุดูˆู ุงูŠุด ู…ูˆุฌูˆุฏ ุนู„ู‰ ุงู„ุตูุญุฉ ุงู„ุฑุฆูŠุณูŠุฉ، ุนู†ุฏู†ุง cockpit ูˆู‡ูˆ ู†ูˆุน ู…ู† CMS  ูˆุงู„ู„ูŠ ู‡ูŠ Content Management Systems ูˆ ู‡ูŠ ุฃู†ุธู…ุฉ ุชุณุงุนุฏ ุงู„ู…ุณุชุฎุฏู…ูŠู† ูŠุณูˆูˆู†، ูˆูŠุฏูŠุฑูˆู†، ูˆูŠุนุฏู„ูˆู† ุนู„ู‰ ู…ูˆุงู‚ุน ุฅู†ุชุฑู†ุช، ุจุฏูˆู† ู…ุง ูŠูƒูˆู† ุนู†ุฏู‡ู… ู…ุนุฑูุฉ ูƒุจูŠุฑุฉ ุจุงู„ุจุฑู…ุฌุฉ، ุฃูˆ ุญุชู‰ ู…ุง ูŠูƒูˆู† ุนู†ุฏู‡ู… ู…ุนุฑูุฉ ุฅุทู„ุงู‚ًุง، ู…ุซุงู„ ุนู„ูŠู‡ุง WordPress. ุจุงู„ุนุงุฏุฉ ู„ู…ุง ู†ู„ุงู‚ูŠ CMS ุฃูˆู„ ู…ุนู„ูˆู…ุฉ ู†ุญุงูˆู„ ู†ุญุตู„ ุนู„ูŠู‡ุง ู‡ูŠ ุงู„ู†ุณุฎุฉ ู„ู„ู†ุธุงู…، ุฃุญูŠุงู† ุชูƒูˆู† ุงู„ู†ุณ...