Building my Home Lab part 4: deploying the domain controller and endpoints

In the previous section, we looked at deploying the hypervisor, firewall and router. This part focuses on emulating a realistic office network consisting of multiple endpoint OSs. The aim is to deploy one system each as a template that we can then clone to their respective networks as needed. We will setup an active directory … Continue reading Building my Home Lab part 4: deploying the domain controller and endpoints

Building my Home Lab part 3: deploying the core infrastructure (hypervisor,firewall and router)

Let's continue with our lab upgrade project. So far, we've assembled the hardware and hopefully come up with a good enough architectural network design to get us started. Our next step will be to deploy the core infrastructure which will be made up of the hypervisor, firewall and router. For those new to the term, … Continue reading Building my Home Lab part 3: deploying the core infrastructure (hypervisor,firewall and router)

WriteUp: HackTheBox Bashed

Bashed is a Linux machine rated easy. We gain access to the user flag via basic enumeration. To get the root flag, we have to escalate privileges by taking advantage of a scheduled cron job that can run without a password being required. Table of Contents ReconnaissanceEnumerationUser FlagPrivilege EscalationRoot FlagDefender's Note Reconnaissance We start off … Continue reading WriteUp: HackTheBox Bashed