Analytify (Bug): cURL error 77: error setting certificate verify locations: CAfile: /etc/nginx/ssl/cacert.pem CApath: /etc/ssl/certs (see https://curl.haxx.se/libcurl/c/libcurl-errors.html) for https://oauth2.googleapis.com/token August 2021 - c0dedead.io

Month: August 2021

VulnOS 2 Walkthrough (OSCP Prep)

Continuing our series of write-ups for OSCP-like VulnHub boxes, today we'll tackle the VulnOS 2 virtual machine. VulnOS 2 is an Ubuntu box running SSH, HTTP, and, interestingly, an IRC daemon. To get root, we'll need to enumerate the webserver to find a classic SQL injection vulnerability. We'll then use the SQLi to capture credentials and log in over SSH. Finally on the system, some basic enumeration will lead us to a kernel exploit to pop a root shell.

Read more

Stapler – A Second Approach (OSCP Prep)

In the first Stapler walkthrough, we managed a very easy path to a shell by enumerating usernames over SMB and brute-forcing a password with Hydra. From there, some quick digging through the home directories revealed a plain-text password to an account with complete sudo privileges. Root was trivial. In this article, we will take a look at a different route to rooting this box through a "hidden" WordPress blog and a kernel exploit.

Read more

FristiLeaks Walkthrough (OSCP Prep)

Fristileaks is a fairly straightforward CTF-like machine that is considered a good practice box while preparing for the OSCP. The goal is to get root and read the flag file, and the focus is on enumeration.< We will need to read the source for clues, bypass a file upload filter, and even a little guesswork along the way. This write-up will walk through the Fristileaks box from boot to root.

Read more