Как наказать цифрового воробья или как я проходил таск PigeonsRevenge от платформы ACLabs.pro

Данный таск был частью 5 сезона CTF, который проходил на площадке ACLabs. Машина необычная с увлекательным сюжетом и интересными уязвимостями. Условие задачи: Борис — старый почтовый голубь. Катя, его голубка, улетела к наглому Воробью. Три дня Борис пил дешёвое пойло и строчил план мести. Теперь этот план у тебя. Помоги Борису пробраться в цифровое гнездо Воробья, украсть его аккаунт и стать рутом. Следуй за пьяными записками — там всё сказано и даже больше. Внимание, стенд будет полностью готов только по истечении обратного времени отсчета, даже если адрес появился раньше! Цепочка атаки Атакующая цепочка «PigeonsRevenge» комбинирует одну реальную критическую CVE (Webmin 1.910 — CVE-2019-15107, 9.8 CRITICAL) с набором классических техник ATT&CK : активная разведка → port knocking → эксплуатация публичного приложения → Metasploit reverse-shell → туннелирование Ligolo-ng → инъекция через переменную окружения в кастомный бинарник → обход фильтра табуляцией → закрепление с root -привилегиями.

https://habr.com/ru/articles/1024360/

#nmap #bash #docker #ssh #ghidra #cve #webmin #metasploit #privelege_escalation #pivoting

Как наказать цифрового воробья или как я проходил таск PigeonsRevenge от платформы ACLabs.pro

Как наказать цифрового воробья или как я проходил таск PigeonsRevenge от платформы ACLabs.pro Категория: Web/Linux/Forensics/PrivEsc Сложность: Medium/Hard (оценивается примерно в 70 голубей из 100)...

Хабр

Öffentlich oder Privat? Verstehe die IP-Architektur, wie #NAT funktioniert und warum IPv6 die Zukunft ist. Mit praktischen Linux-Beispielen zur Netzwerkanalyse, Tools wie ip und #nmap sowie Tipps zur Fehlerbehebung.

https://admindocs.de/de/netzwerk/oeffentliche-vs-private-ip-adresse-die-hauptunterschiede

#netzwerk #ipadressen #ipv4 #ipv6 #sicherheit #firewall #troubleshooting #sysadmin

Öffentliche vs. private IP-Adresse: Die Hauptunterschiede

Öffentlich oder Privat? Verstehe die IP-Architektur, wie NAT funktioniert und warum IPv6 die Zukunft ist. Mit praktischen Linux-Beispielen zur Netzwerkanalyse, Tools wie ip und nmap sowie Tipps zur Fehlerbehebung.

Admin:Docs
I submitted a Pull Request to update MacPorts' nmap to 7.99 here:

https://github.com/macports/macports-ports/pull/32137

GitHub Continuous Integration checks passed OK.

It's up to someone else with commit access to merge it.

Meanwhile, since the OpenSSH 10.3p1 PR was merged, this issue reared its head on OS X Snow Leopard:

https://trac.macports.org/ticket/73786#comment:1

I'm guessing, some of the sandbox stuff removed in a more recent MacPorts OpenSSH release may be why? I tried, unsuccessfully, to refactor that and even put out an appeal to the MacPorts' dev mailing list to no avail. ;-/

Also, that PAM related OpenSSH issue reported on OS X Leopard (PPC) does not appear to have been fixed by 10.3p1's PAM related changes as I had hoped: https://trac.macports.org/ticket/73757

Dang it!

It is not exactly as if I am at my wit's end. I do have at least a G4 PowerBook in storage, but I do not know when I will next get to my storage unit. Similarly, I may have a system capable of running Snow Leopard in storage (or at least, I think I did, long ago?)? I do not know when I will be able to retrieve them nor how helpful my own skills will be in remediating either of those issues though. ;-/

Maybe it is the sort of stuff that should be reported upstream? I dunno; it feels as if it is probably more of a MacPorts' thing than an upstream thing tbh; and while there are definitely some valiant MacPorts' maintainers who rawk older OS X versions on the regular by the looks of things? I am not among them.

#MacPorts #nmap #OpenSSH #PastTheirPrimeOSReleases
nmap: update to 7.99 by artkiver · Pull Request #32137 · macports/macports-ports

Description Type(s) bugfix enhancement security fix Tested on macOS 26.4 25E246 arm64 Command Line Tools 26.4.0.0.1774242506 Verification Have you followed our Commit Message Guidelines?...

GitHub

📡 Tu teléfono puede escanear redes como un profesional… 👀

En esta ocasión, se utilizan las herramientas de escaneo de ANDRAX para analizar las redes y comprobar los servicios expuestos.

Nmap y mucho más, todo desde un dispositivo móvil.

⚠️ Solo para uso educativo.

#CyberSecurity #Nmap #Infosec #NetworkSecurity #Ciberseguridad # #Seguridad #Privacidad 🔏

🌗 電影中的 Nmap 安全掃描器
➤ 從科幻特效到真實駭客工具:揭祕 Nmap 在電影中的客串時刻
https://nmap.org/movies/
過去好萊塢電影中的駭客場景常以誇張的 3D 動畫呈現,缺乏真實感。然而,Nmap 網絡掃描工具卻意外成為電影界的「明星」,多次出現在《駭客任務:重裝上陣》、《瞞天過海:八面玲瓏》、《史諾登》等知名作品中。開發者 Fyodor 在此整理了這些電影場景,並指出電影創作者開始傾向使用真實的軟體操作介面,以提升劇情的寫實度與專業感。這不僅是對資訊安全工具的肯定,也讓觀眾對現實中的駭客操作有了更貼近真實的認知。
+ 看到《駭客任務》裡 Trinity 真實使用 Nmap 掃描 SSH 漏洞時,我當時真的驚呆了,這絕對是影史上最專業的駭客戲份之一。
+ 電影願意為了真實性而在背景畫面中加入這些專業工具是好事,這讓像我們這樣的 IT 從業人員看電影時更有代入感。
#網路安全 #影視文化 #Nmap #駭客技術
Movies Featuring the Nmap Security Scanner

The Nmap Security Scanner appears in many major motion pictures and smaller films. This gallery provides screen shots and details for each movie.

🎬 Oh, Hollywood, you never fail to amuse with your tech "accuracy" 🤣. When in doubt, just slap some #Nmap on the screen for that authentic hacker vibe, because who needs realism when you have #Fyodor to document your cinematic blunders? 📽️ Meanwhile, the real question is: does anyone actually mail Fyodor, or is this just another entry in the "tech in movies" #comedy goldmine? 📧💻
https://nmap.org/movies/ #HollywoodTech #MovieAccuracy #HackerNews #ngated
Movies Featuring the Nmap Security Scanner

The Nmap Security Scanner appears in many major motion pictures and smaller films. This gallery provides screen shots and details for each movie.

Movies Featuring the Nmap Security Scanner

The Nmap Security Scanner appears in many major motion pictures and smaller films. This gallery provides screen shots and details for each movie.

New HTB walkthrough: REDEEMER (Tier 0) - Redis fundamentals for beginners.

Redis is everywhere! Caching, session stores, job queues – and when it is exposed or misconfigured, it can leak sensitive data. I just published a beginner-focused walkthrough that covers:

🔹 How sensitive data can be stored directly in memory
🔹 What Redis is and common use cases
🔹 Why you shouldn't expose Redis without authentication
🔹 How to identify Redis with Nmap (port 6379)
🔹 How to connect with "redis-cli", enumerate keys and databases
🔹 Why "KEYS *" is fine for CTFs but use "SCAN" in production

This is part of my ongoing Hack The Box Starting Point – Step-by-Step Walkthrough for Beginners series, where the goal is to help newcomers build strong fundamentals in ethical hacking.

🎥 Watch the HTB Redeemer walkthrough here:

https://www.youtube.com/watch?v=81JN1vy1HGY

📂 Full playlist:

https://www.youtube.com/playlist?list=PL2mncq0mb-6iZ6ngDmwGEywmxnCYwO2s_

If you are transitioning into cybersecurity, bug bounty, or pentesting - this series is built for you.

Happy learning and keep hacking ethically 🔐

#CyberSecurity #EthicalHacking #HackTheBox #PenetrationTesting #Learning #TechEducation #BeginnerHacking #HTBStartingPoint #Nmap #KaliLinux #redis

Hack The Box REDEEMER Walkthrough | Learning Redis for Beginners (Step-by-Step)

YouTube

Exploit LLMs to perform #network discovery and security scanning tasks using the powerful #Nmap tool.

#cybersecurity #hackers #skills #llm