The first version of my Rubber Ducky script to exfil wifi passwords via POST dumped each wifi profile as a XML file then sent the desired fields as a POST request. This works
This was a fun box - I knew what LDAP was but had never really used it so it was cool to learn something. Nmap scan showed:22/tcp open ssh OpenSSH 7.
In the spirit of giving back to the community, I'm sharing some simple bash scripts I wrote that make life easier and save time whether you are in the OSCP labs, HackTheBox or
Last year a new attack on WPA2 was announced by the creators of hashcat - one that didn't require capturing the 4-way handshake, any client interaction or any kind of client even connected.
This was a pretty fun and straightforward little box and would be great practice for anyone studying for the OSCP.Nmap shows a few things running:PORT STATE SERVICE REASON VERSION22/tcp open