Hack the Box — Archetype
Tags
attack-pattern: | Credentials - T1589.001 Powershell - T1059.001 Python - T1059.006 Server - T1583.004 Server - T1584.004 Software - T1592.002 Tool - T1588.002 Powershell - T1086 |
Common Information
Type | Value |
---|---|
UUID | cfb8868a-7728-4ef6-9607-1fb8c7f27570 |
Fingerprint | 978c995125870bc7 |
Analysis status | DONE |
Considered CTI value | -2 |
Text language | |
Published | Jan. 12, 2023, 7:52 p.m. |
Added to db | Jan. 12, 2023, 9:14 p.m. |
Last updated | Nov. 17, 2024, 11:40 p.m. |
Headline | Hack the Box — Archetype |
Title | Hack the Box — Archetype |
Detected Hints/Tags/Attributes | 37/1/24 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 167 | ✔ | Cybersecurity on Medium | https://medium.com/feed/tag/cybersecurity | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 14 | app.hackthebox.com |
|
Details | Domain | 10 | mssqlclient.py |
|
Details | Domain | 1 | pentestwiki.org |
|
Details | Domain | 4128 | github.com |
|
Details | Domain | 37 | psexec.py |
|
Details | File | 10 | mssqlclient.py |
|
Details | File | 33 | nc.exe |
|
Details | File | 1208 | powershell.exe |
|
Details | File | 1 | c:\\users\public\\nc.exe |
|
Details | File | 2126 | cmd.exe |
|
Details | File | 255 | user.txt |
|
Details | File | 34 | psexec.py |
|
Details | File | 2 | winpeasx64.exe |
|
Details | File | 16 | consolehost_history.txt |
|
Details | Github username | 1 | int0x33 |
|
Details | Github username | 8 | carlospolop |
|
Details | IPv4 | 1 | 10.10.10.27 |
|
Details | IPv4 | 619 | 0.0.0.0 |
|
Details | IPv4 | 1 | 10.129.102.63 |
|
Details | Url | 1 | https://app.hackthebox.com/starting-point |
|
Details | Url | 1 | https://pentestwiki.org/academy/how-to-get-a-xp_cmdshell-reverse-shell |
|
Details | Url | 1 | https://github.com/int0x33/nc.exe/blob/master/nc.exe |
|
Details | Url | 9 | http://0.0.0.0:8000 |
|
Details | Url | 1 | https://github.com/carlospolop/peass-ng/releases/download/refs/pull/260/merge/winpeasx64.exe |