<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>privesc on Asa&#39;s Website</title><link>https://ahessmat.netlify.com/tags/privesc/</link><description>Recent content in privesc on Asa&#39;s Website</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Sun, 21 Feb 2021 03:38:18 +0000</lastBuildDate><atom:link href="https://ahessmat.netlify.com/tags/privesc/index.xml" rel="self" type="application/rss+xml"/><item><title>HackTheBox Writeup - Delivery</title><link>https://ahessmat.netlify.com/post/2021-02-hackthebox-writeup-delivery/</link><pubDate>Sun, 21 Feb 2021 03:38:18 +0000</pubDate><guid>https://ahessmat.netlify.com/post/2021-02-hackthebox-writeup-delivery/</guid><description>Preamble This is a writeup of the Hack The Box (HTB) machine, Delivery. This machine is notable for its use of introducing attackers to a guided methodology of enumerating for a foothold. The privesc vector likewise leans on some tried-and-true search methods.
Like many targets, we begin enumerating the machine for open ports and services. To do this, we use nmap with some particular options
-sC: run default scripts, including some more intrusive ones -sV: probe open ports to determine service and version of said service.</description></item></channel></rss>