rufflabs.com
open-menu closeme
Home
Writeups
github twitter linkedin rss
  • BreakICT 2022 CTF Walkthrough (Part 2)

    calendar Sep 6, 2023 · 9 min read · writeup ctf walkthrough  ·
    Share on: twitter facebook linkedin copy

    Part 2 of 2 of a series of walkthroughs for the BreakICT CTF at OzSec 2022. Here I post the remaining challenges walkthroughs, including the ones I did not complete during the CTF itself, but were available after the CTF ended.


    Read More
  • Fixing Kernel Panic in Ubuntu Packer Builds

    calendar Mar 24, 2023 · 3 min read ·  ·
    Share on: twitter facebook linkedin copy

    When building an Ubuntu image using Packer I was building out my own .pkr.hcl template file. Everything seemed to be fine, except I could never get the build to boot into the cloud-init and start installing the operating system. This post discusses the kernel panic and how to solve it.


    Read More
  • Certified CyberDefender Review

    calendar Mar 16, 2023 · 4 min read · review  ·
    Share on: twitter facebook linkedin copy
    Certified CyberDefender Review

    A review of the Certified CyberDefender (CCD) course and certification exam from cyberdefenders.org.


    Read More
  • Installing pip for Python2

    calendar Nov 23, 2022 · 1 min read ·  ·
    Share on: twitter facebook linkedin copy
    Installing pip for Python2

    While Python2 is end of life and should not be used, there are some tools and scripts out there that are not compatible with Python3. This guide shows how to get pip installed for Python2.


    Read More
  • BreakICT 2022 CTF Walkthrough (Part 1)

    calendar Oct 21, 2022 · 4 min read · ctf writeup walkthrough  ·
    Share on: twitter facebook linkedin copy

    Part 1 of a series of walkthroughs for the BreakICT CTF at OzSec 2022. Today we take on four of the challenges ranging from web discovery to identifying and decoding messages.


    Read More
  • Anatomy of a Reverse Shell: nc named pipe

    calendar May 21, 2022 · 8 min read · RevShell PenTest Docker Lab  ·
    Share on: twitter facebook linkedin copy
    Anatomy of a Reverse Shell: nc named pipe

    Breaking down the cryptic reverse shell using nc and named pipes. How the reverse shell works, and a hands-on docker lab to test out reverse shells.


    Read More
  • LetsDefend Walkthrough SOC164 Suspicious MSHTA Behavior

    calendar Mar 24, 2022 · 8 min read · letsdefend writeup  ·
    Share on: twitter facebook linkedin copy
    LetsDefend Walkthrough SOC164 Suspicious MSHTA Behavior

    Today's LetsDefend walkthrough will be investigating Event ID 114 - Suspicious MSHTA Behavior. Where an alert is raised due to mshta.exe executing a .hta script file that is considered low reputation.


    Read More
  • Remediating Nessus Plugin ID 139239 "Windows Security Feature Bypass in Secure Boot (BootHole)"

    calendar Mar 8, 2022 · 11 min read · Nessus CVE-2020-10713 HowTo BootHole  ·
    Share on: twitter facebook linkedin copy
    Remediating Nessus Plugin ID 139239 "Windows Security Feature Bypass in Secure Boot (BootHole)"

    How do you remediate BootHole as identified by Nessus Plugin ID 139239 in Windows systems? Here we will be discussing this vulnerability and how to properly remediate it from your Windows hosts.


    Read More

Jason Taylor

Husband, father, problem solver.

Featured Posts

  • Certified CyberDefender Review
  • Anatomy of a Reverse Shell: nc named pipe
  • Remediating Nessus Plugin ID 139239 "Windows Security Feature Bypass in Secure Boot (BootHole)"

Recent Posts

  • BreakICT 2022 CTF Walkthrough (Part 2)
  • Fixing Kernel Panic in Ubuntu Packer Builds
  • Installing pip for Python2
  • BreakICT 2022 CTF Walkthrough (Part 1)
  • LetsDefend Walkthrough SOC164 Suspicious MSHTA Behavior

Categories

WRITEUPS 3 BLOG 1

Tags

WRITEUP 3 CTF 2 WALKTHROUGH 2 BOOTHOLE 1 CVE-2020-10713 1 DOCKER 1 HOWTO 1 LAB 1 LETSDEFEND 1 NESSUS 1 PENTEST 1 REVIEW 1 REVSHELL 1
rufflabs

Copyright  RUFFLABS. All Rights Reserved

to-top