Jan. 31, 2024, 1:23 p.m. | xocybersec

System Weakness - Medium systemweakness.com

Hacking, Misconfigured Permissions, Cronjobs

OffSec — Dawn Walkthrough

A walkthrough with my tactics, techniques, and procedures.

Reconnaissance/Scanning:

Let’s start things off with a network scan to see which ports are open and the services running on each.

$ nmap -A -O -sC -sV -p- <machine_IP>
Nmap scan results.

Scanning for directories with Gobuster:

Contents of /logs directory:

Contents of /logs directory.

I couldn’t view any except the management.log file. I’ll parse through that after I enumerate some more.

Enumerating …

a network cybersecurity directory gobuster hacking logs misconfigured network nmap offsec pentesting permissions ports privilege escalation procedures reconnaissance results running scan scanning services start tactics techniques things walkthrough

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)