Monteverde HTB Writeup as OSCP preparation
Tags
attack-pattern: | Data Credentials - T1589.001 Dns - T1071.004 Dns - T1590.002 Powershell - T1059.001 Server - T1583.004 Server - T1584.004 Tool - T1588.002 Powershell - T1086 Sudo - T1169 |
Common Information
Type | Value |
---|---|
UUID | 656494a6-98b6-45c5-8271-886d857992b8 |
Fingerprint | ea18c15affe52f87 |
Analysis status | DONE |
Considered CTI value | -2 |
Text language | |
Published | Oct. 10, 2024, 6:26 p.m. |
Added to db | Oct. 10, 2024, 8:30 p.m. |
Last updated | Nov. 17, 2024, 7:44 p.m. |
Headline | Monteverde HTB Writeup as OSCP preparation |
Title | Monteverde HTB Writeup as OSCP preparation |
Detected Hints/Tags/Attributes | 44/1/15 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 167 | ✔ | Cybersecurity on Medium | https://medium.com/feed/tag/cybersecurity | 2024-08-30 22:08 |
Details | 168 | ✔ | Infosec on Medium | https://medium.com/feed/tag/infosec | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 258 | nmap.org |
|
Details | Domain | 4127 | github.com |
|
Details | Domain | 10 | microsoft.powershell.management |
|
Details | File | 41 | users.txt |
|
Details | File | 2 | azure.xml |
|
Details | File | 1 | azure-adconnect.ps1 |
|
Details | Github username | 9 | hackplayers |
|
Details | IPv4 | 2 | 10.10.10.172 |
|
Details | IPv4 | 5 | 3.1.0.0 |
|
Details | IPv4 | 1441 | 127.0.0.1 |
|
Details | IPv6 | 1 | dead:beef::7190:4cb:d750:3d52 |
|
Details | Url | 132 | https://nmap.org |
|
Details | Url | 92 | https://nmap.org/submit |
|
Details | Url | 1 | http://10.10.10.172:5985/wsman |
|
Details | Url | 7 | https://github.com/hackplayers/evil-winrm#remote |