Hack the Box: Fulcrum Walkthrough - Hacking Articles
Tags
attack-pattern: | Data Credentials - T1589.001 Powershell - T1059.001 Python - T1059.006 Server - T1583.004 Server - T1584.004 Tool - T1588.002 Powershell - T1086 |
Common Information
Type | Value |
---|---|
UUID | e6207582-92bf-4fd9-82e0-82a09a4411de |
Fingerprint | bf96954b91af3285 |
Analysis status | DONE |
Considered CTI value | -2 |
Text language | |
Published | Sept. 17, 2018, 4:47 p.m. |
Added to db | Jan. 19, 2023, 12:11 a.m. |
Last updated | Nov. 19, 2024, 4:09 a.m. |
Headline | Hacking Articles |
Title | Hack the Box: Fulcrum Walkthrough - Hacking Articles |
Detected Hints/Tags/Attributes | 39/1/19 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | http://www.hackingarticles.in/hack-the-box-fulcrum-walkthrough/ |
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 2 | tio.run |
|
Details | Domain | 2 | properties.name |
|
Details | Domain | 340 | system.net |
|
Details | Domain | 22 | stream.read |
|
Details | File | 256 | user.txt |
|
Details | File | 205 | root.txt |
|
Details | File | 72 | shell.php |
|
Details | File | 1 | fulcrum_upload_to_corp.ps1 |
|
Details | File | 1 | checkfileserver.ps1 |
|
Details | File | 1 | invoke-psexec.ps1 |
|
Details | File | 70 | web.config |
|
Details | File | 1 | c:\user\btables\desktop\user.txt |
|
Details | File | 1 | c:\users\administrator\desktop we find a file called root.txt |
|
Details | IPv4 | 1 | 10.10.10.62 |
|
Details | IPv4 | 7 | 10.10.14.6 |
|
Details | IPv4 | 1 | 192.168.122.228 |
|
Details | IPv4 | 1 | 192.168.199.130 |
|
Details | Url | 1 | https://tio.run/powershell |
|
Details | Url | 1 | http://10.10.14.6/socat |