Jan. 31, 2024, 1:23 p.m. | xocybersec

System Weakness - Medium systemweakness.com

Hacking, Misconfigured Permissions, Cronjobs

OffSec — Dawn Walkthrough

A walkthrough with my tactics, techniques, and procedures.

Reconnaissance/Scanning:

Let’s start things off with a network scan to see which ports are open and the services running on each.

$ nmap -A -O -sC -sV -p- <machine_IP>
Nmap scan results.

Scanning for directories with Gobuster:

Contents of /logs directory:

Contents of /logs directory.

I couldn’t view any except the management.log file. I’ll parse through that after I enumerate some more.

Enumerating …

a network cybersecurity directory gobuster hacking logs misconfigured network nmap offsec pentesting permissions ports privilege escalation procedures reconnaissance results running scan scanning services start tactics techniques things walkthrough

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Officer Hospital Laguna Beach

@ Allied Universal | Laguna Beach, CA, United States

Sr. Cloud DevSecOps Engineer

@ Oracle | NOIDA, UTTAR PRADESH, India

Cloud Operations Security Engineer

@ Elekta | Crawley - Cornerstone

Cybersecurity – Senior Information System Security Manager (ISSM)

@ Boeing | USA - Seal Beach, CA

Engineering -- Tech Risk -- Security Architecture -- VP -- Dallas

@ Goldman Sachs | Dallas, Texas, United States