Jan. 25, 2024, 11:22 a.m. | xocybersec

System Weakness - Medium systemweakness.com

Hacking, Misconfigured Permissions, Unrestricted File Upload

OffSec — Katana Walkthrough

A walkthrough with my tactics, techniques, and procedures.

Reconnaissance/Scanning:

Let’s start things off with a network scan to see which ports are open and the services running on each.

$ nmap -A -O -sC -sV -p- <machine_IP>
Nmap scan results

Gobuster scan of port 80:

Gobuster scan results for port 80

Scanning /ebook directory.

Gobuster scan results for /ebook

Visiting the /ebook page.

There’s also an Admin Login link on …

a network cybersecurity directory ebook ethical hacking file gobuster hacking misconfigured network nmap offensive security offsec permissions port ports procedures reconnaissance results running scan scanning services start tactics techniques things walkthrough

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Officer Hospital Laguna Beach

@ Allied Universal | Laguna Beach, CA, United States

Sr. Cloud DevSecOps Engineer

@ Oracle | NOIDA, UTTAR PRADESH, India

Cloud Operations Security Engineer

@ Elekta | Crawley - Cornerstone

Cybersecurity – Senior Information System Security Manager (ISSM)

@ Boeing | USA - Seal Beach, CA

Engineering -- Tech Risk -- Security Architecture -- VP -- Dallas

@ Goldman Sachs | Dallas, Texas, United States