<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: RICK SANCHEZ</title>
    <description>The latest articles on DEV Community by RICK SANCHEZ (@rickc137).</description>
    <link>https://dev.to/rickc137</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F807966%2Fd24a982e-c758-476e-b3f2-4b75bd5553b0.jpg</url>
      <title>DEV Community: RICK SANCHEZ</title>
      <link>https://dev.to/rickc137</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/rickc137"/>
    <language>en</language>
    <item>
      <title>Setting Up Postgres Server on Ubuntu</title>
      <dc:creator>RICK SANCHEZ</dc:creator>
      <pubDate>Wed, 08 Mar 2023 10:16:48 +0000</pubDate>
      <link>https://dev.to/rickc137/setting-up-postgres-server-on-ubuntu-25o4</link>
      <guid>https://dev.to/rickc137/setting-up-postgres-server-on-ubuntu-25o4</guid>
      <description>&lt;h2&gt;
  
  
  Installing Postgres
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Update and Upgrade the server&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;sudo apt install wget ca-certificates&lt;/code&gt; to install wget and ca-certificates&lt;/li&gt;
&lt;li&gt;Get the certificate and add it to apt-key management

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;wget --quiet -O - https://www.postgresql.org/media/keys/ACCC4CF8.asc | sudo apt-key add -&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;sudo sh -c 'echo "deb http://apt.postgresql.org/pub/repos/apt/ $(lsb_release -cs)-pgdg main" &amp;gt;&amp;gt; /etc/apt/sources.list.d/pgdg.list'&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Throw and Error:
-&amp;gt; install this missing dependency : &lt;code&gt;apt install gnupg&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;
&lt;li&gt;Update the server : &lt;code&gt;sudo apt update&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Install Postgres : &lt;code&gt;apt install postgresql postgresql-contrib&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Check Postgres : &lt;code&gt;service postgresql status&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Setting Up Postgres Server
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Enable connection from the client
&lt;code&gt;nano /etc/postgresql/14/main/postgresql.conf&lt;/code&gt;

&lt;ul&gt;
&lt;li&gt;Uncomment and replace ip_address with &lt;code&gt;*&lt;/code&gt; : 
&lt;code&gt;listen_addresses = '*'&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;
&lt;li&gt;Edit the PostgreSQL access policy
&lt;code&gt;nano /etc/postgresql/14/main/pg_hba.conf&lt;/code&gt;

&lt;ul&gt;
&lt;li&gt;Append the following line : &lt;code&gt;host all all 0.0.0.0/0 md5&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;
&lt;li&gt;Restart the Server &lt;code&gt;systemctl restart postgresql&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Creating a new User and Database
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Creating a new user
&lt;code&gt;sudo -u postgres createuser &amp;lt;username&amp;gt;&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Creaing a new databse
&lt;code&gt;sudo -u postgres createdb &amp;lt;dbname&amp;gt;&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Change Password and grant privileges on database
&lt;code&gt;sudo -u postgres psql&lt;/code&gt;
&lt;code&gt;alter user &amp;lt;username&amp;gt; password '&amp;lt;password&amp;gt;';&lt;/code&gt;
&lt;code&gt;grant all privileges on database &amp;lt;dbname&amp;gt; to &amp;lt;username&amp;gt; ;&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Check the Connection using
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;psql -h &amp;lt;ip_address&amp;gt; -p 5432 -d &amp;lt;database&amp;gt; -U &amp;lt;username&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
    </item>
    <item>
      <title>Vulnhub Harry Potter Aragog - Walkthrough</title>
      <dc:creator>RICK SANCHEZ</dc:creator>
      <pubDate>Sat, 12 Nov 2022 15:57:28 +0000</pubDate>
      <link>https://dev.to/rickc137/vulnhub-harry-potter-aragog-walkthrough-oig</link>
      <guid>https://dev.to/rickc137/vulnhub-harry-potter-aragog-walkthrough-oig</guid>
      <description>&lt;p&gt;Import the Vulnerable machine in your virtual box. Change the Network settings to bridged adapter so that you can access the machine.&lt;/p&gt;

&lt;p&gt;Let's get started !&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--cOOPce86--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/z49wpjo0senva4p6zsri.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--cOOPce86--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/z49wpjo0senva4p6zsri.png" alt="Image description" width="820" height="703"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Inital Scanning
&lt;/h3&gt;

&lt;h4&gt;
  
  
  Nmap Scan
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--FCLvkrqh--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/jwh5nuetm49026uv4gl3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--FCLvkrqh--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/jwh5nuetm49026uv4gl3.png" alt="Image description" width="880" height="403"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We can see that our machine is hosting and the ssh port is open. Let's check out the website.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--oXM2pLOo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/3qqy0r9xjxt1ugiemo4l.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--oXM2pLOo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/3qqy0r9xjxt1ugiemo4l.png" alt="Image description" width="880" height="480"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Dirbuster
&lt;/h3&gt;

&lt;p&gt;Use dirbuster to find the directories&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--OvuMB7cM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/o81coy3op9rvr81140dc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--OvuMB7cM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/o81coy3op9rvr81140dc.png" alt="Image description" width="880" height="438"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We found '/blog' directory &lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--EA0d6H16--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/32xa799asbpfzd2nmcbr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--EA0d6H16--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/32xa799asbpfzd2nmcbr.png" alt="Image description" width="880" height="480"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt;&lt;br&gt;
Configue the /etc/hosts to access other hyperlinks&lt;/p&gt;

&lt;p&gt;By Looking at footer of the website we are able to confirm that it is a wordpress website and we can confirm it using wappalyzer&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--QwPMeg4t--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/z7cp3ur19i28kc2w9jps.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--QwPMeg4t--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/z7cp3ur19i28kc2w9jps.png" alt="Image description" width="511" height="541"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Metasploit
&lt;/h3&gt;

&lt;h4&gt;
  
  
  Scan for vulnerability
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--i0HuH1us--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/m8e8hz5no3v3i7ouyug8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--i0HuH1us--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/m8e8hz5no3v3i7ouyug8.png" alt="Image description" width="819" height="39"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;we use this module in metasploit to scan for the vulnerability.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--YkoOjn_b--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1ku1zu21hwhzlpya61r1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--YkoOjn_b--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1ku1zu21hwhzlpya61r1.png" alt="Image description" width="880" height="289"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;we found a exploit on msf&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--FqF-bkAA--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/l0cfipt0o9nr74s7nl06.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--FqF-bkAA--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/l0cfipt0o9nr74s7nl06.png" alt="Image description" width="880" height="129"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;run the exploit with the following options&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--z2PiWGNE--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/c78i071iyzq4c0mhrv1l.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--z2PiWGNE--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/c78i071iyzq4c0mhrv1l.png" alt="Image description" width="880" height="305"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Run the exploit&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--9ZI5pzLh--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/gvvfj1mmdwpowid1uppd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--9ZI5pzLh--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/gvvfj1mmdwpowid1uppd.png" alt="Image description" width="880" height="134"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;we got the meterpreter shell.&lt;/p&gt;

&lt;p&gt;In the home directory we can see two folders&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--csj4Vrpf--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zea5unjxmgf1h5c2o8t4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--csj4Vrpf--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zea5unjxmgf1h5c2o8t4.png" alt="Image description" width="839" height="251"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Inside hagrid's folder we found the First Horcrux&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--nVdOTDVz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1s340wft6uc3wnbws39l.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--nVdOTDVz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1s340wft6uc3wnbws39l.png" alt="Image description" width="880" height="318"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here is the first Horcrux&lt;/p&gt;

&lt;p&gt;&lt;code&gt;horcrux_{MTogUmlkRGxFJ3MgRGlBcnkgZEVzdHJvWWVkIEJ5IGhhUnJ5IGluIGNoYU1iRXIgb2YgU2VDcmV0cw==}&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Now we need to privelate the user permission&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--h0Hh8-Ql--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/xkjw7kbfzyd6f4j883s4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--h0Hh8-Ql--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/xkjw7kbfzyd6f4j883s4.png" alt="Image description" width="701" height="87"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  linpeas
&lt;/h3&gt;

&lt;p&gt;Upload the lipeas.sh to the server&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--uUUBWO9o--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/wwaajv7iv8zid5iyhehy.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--uUUBWO9o--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/wwaajv7iv8zid5iyhehy.png" alt="Image description" width="880" height="48"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;run linpeas&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--i2H7j4-Z--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/g46skbjcwenkxv1bvnaz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--i2H7j4-Z--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/g46skbjcwenkxv1bvnaz.png" alt="Image description" width="880" height="468"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We found the DB login details&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--_-0t_WK1--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9hlgzwhcplhcu3xz95er.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--_-0t_WK1--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9hlgzwhcplhcu3xz95er.png" alt="Image description" width="805" height="262"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Login to the database with the credentials&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--OQoGwAG8--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/mvfrdqgi6240v1okxpk6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--OQoGwAG8--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/mvfrdqgi6240v1okxpk6.png" alt="Image description" width="805" height="126"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;we got the user password hash.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--a93G1SyK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/efg95vx5u9qzpafmh0w5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--a93G1SyK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/efg95vx5u9qzpafmh0w5.png" alt="Image description" width="880" height="55"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Crack the hash with john the ripper.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--uNr3sVlJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/fnixenj8y0g7ft3hsjj4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--uNr3sVlJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/fnixenj8y0g7ft3hsjj4.png" alt="Image description" width="880" height="186"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;ssh to hagrid98 with the password&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--9Y5qZy4O--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/q2fnqjdbzs89cwuunhmb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--9Y5qZy4O--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/q2fnqjdbzs89cwuunhmb.png" alt="Image description" width="880" height="209"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now its time to escalate to the root user.&lt;/p&gt;

&lt;p&gt;Use pspy to find the process running in the backgound here is a guide on how to get started with pspy&lt;/p&gt;

&lt;p&gt;&lt;code&gt;https://vk9-sec.com/how-to-enumerate-services-in-use-with-pspy/&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;we found that backup.sh is running in background with interval and it is running as the root user.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ZrLH6kVF--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/apzpxqhg6ho3fm9ragmi.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ZrLH6kVF--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/apzpxqhg6ho3fm9ragmi.png" alt="Image description" width="880" height="57"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Re-write the .backup.sh with a reverse shell.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;https://www.revshells.com&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--OiKBUIso--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zmhwxa0sek49nf128moj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--OiKBUIso--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zmhwxa0sek49nf128moj.png" alt="Image description" width="880" height="299"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;run a listener on netcat and after sometime you will get the root shell&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ch-YmURA--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9bsqsutavkhetmrccdqn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ch-YmURA--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9bsqsutavkhetmrccdqn.png" alt="Image description" width="880" height="299"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The second Horcrux&lt;/p&gt;

&lt;p&gt;&lt;code&gt;horcrux_{MjogbWFSdm9MbyBHYVVudCdzIHJpTmcgZGVTdHJPeWVkIGJZIERVbWJsZWRPcmU=}&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--DCdsKEzw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/yccj6frhv8tux7dd9qpr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--DCdsKEzw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/yccj6frhv8tux7dd9qpr.png" alt="Image description" width="880" height="388"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Decode the Horcrux with base64:&lt;/p&gt;

&lt;p&gt;1: RidDlE's DiAry dEstroYed By haRry in chaMbEr of SeCrets&lt;br&gt;
2: maRvoLo GaUnt's riNg deStrOyed bY DUmbledOre&lt;/p&gt;

</description>
      <category>vulnhub</category>
      <category>writeup</category>
    </item>
    <item>
      <title>Getting Started With Vulnhub</title>
      <dc:creator>RICK SANCHEZ</dc:creator>
      <pubDate>Fri, 11 Nov 2022 16:57:01 +0000</pubDate>
      <link>https://dev.to/rickc137/getting-started-with-vulnhub-2amk</link>
      <guid>https://dev.to/rickc137/getting-started-with-vulnhub-2amk</guid>
      <description>&lt;p&gt;In this blog we will see how to set up a vulnhub machine and start hacking.Vulnhub is a website which contains vulnerable machines which you can download and start practicing your skills.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.vulnhub.com/"&gt;Visit vulnhub&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--5tuUR0Du--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/07s4k8w3vkej5fqbz1fo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--5tuUR0Du--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/07s4k8w3vkej5fqbz1fo.png" alt="Vulhub homepage" width="880" height="444"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can download any machine that you want to practice with.&lt;/p&gt;

&lt;p&gt;I will downloading the Aragog Machine from the &lt;a href="https://www.vulnhub.com/series/harrypotter,468/"&gt;Harry Potter Series&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--9OJFvaB7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ii9995iab42xhzu1qxpj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--9OJFvaB7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ii9995iab42xhzu1qxpj.png" alt="Image description" width="880" height="444"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Open Virtual Box&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--dAyEB71W--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/yca35zb3qfhofmubprgg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--dAyEB71W--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/yca35zb3qfhofmubprgg.png" alt="Image description" width="880" height="525"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Select "Tools" and Click on "Import"&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--PUEqyfqd--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1i6tgfmpbbiksirza7r9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--PUEqyfqd--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1i6tgfmpbbiksirza7r9.png" alt="Image description" width="880" height="274"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Click on the file button&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--VXtvdIVD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/or3m47sd24v5jmhy7d27.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--VXtvdIVD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/or3m47sd24v5jmhy7d27.png" alt="Image description" width="361" height="105"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Navigate to the .ova file that you have dowloaded from the vulnhub website and click on open.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--bqNMY166--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/xgeheglxzpw3txriwzg3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--bqNMY166--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/xgeheglxzpw3txriwzg3.png" alt="Image description" width="880" height="424"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Click on Next and with the default values click on import.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--266DHDfV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9p53glq440omwjya93yu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--266DHDfV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9p53glq440omwjya93yu.png" alt="Image description" width="880" height="675"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Once the machine imported click on start to start the machine.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--8wN1qvRI--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/rxmszfvzhlhizyi9ueqg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--8wN1qvRI--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/rxmszfvzhlhizyi9ueqg.png" alt="Image description" width="820" height="703"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Happy Hacking!&lt;/p&gt;

</description>
      <category>secuity</category>
      <category>vulnhub</category>
      <category>virtualbox</category>
    </item>
    <item>
      <title>Setting Up An ownCloud server on linode.</title>
      <dc:creator>RICK SANCHEZ</dc:creator>
      <pubDate>Wed, 26 Oct 2022 17:33:38 +0000</pubDate>
      <link>https://dev.to/rickc137/setting-up-an-owncloud-server-on-linode-193d</link>
      <guid>https://dev.to/rickc137/setting-up-an-owncloud-server-on-linode-193d</guid>
      <description>&lt;p&gt;&lt;strong&gt;Step 1&lt;/strong&gt; &lt;br&gt;
&lt;strong&gt;Create a ubuntu server in linode.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Install Docker Engine and Docker Compose&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;1) Update the package index and install packages&lt;/p&gt;

&lt;p&gt;$ &lt;code&gt;sudo apt-get update&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;$ &lt;code&gt;sudo apt-get install \&lt;br&gt;
      ca-certificates \&lt;br&gt;
      curl \&lt;br&gt;
      gnupg \&lt;br&gt;
      lsb-release&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;2) Add Docker's official GPG key&lt;/p&gt;

&lt;p&gt;$ &lt;code&gt;sudo mkdir -p /etc/apt/keyrings&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;$ &lt;code&gt;curl -fsSL https://download.docker.com/linux/ubuntu/gpg | sudo gpg --dearmor -o /etc/apt/keyrings/docker.gpg&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;3) Set up the repository&lt;/p&gt;

&lt;p&gt;$ &lt;code&gt;echo \&lt;br&gt;
  "deb [arch=$(dpkg --print-architecture) signed-by=/etc/apt/keyrings/docker.gpg] https://download.docker.com/linux/ubuntu \&lt;br&gt;
  $(lsb_release -cs) stable" | sudo tee /etc/apt/sources.list.d/docker.list &amp;gt; /dev/null&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;4) Install Docker Engine and Docker Compose&lt;/p&gt;

&lt;p&gt;$ &lt;code&gt;sudo apt-get update&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;$ &lt;code&gt;sudo apt-get install docker-ce docker-ce-cli containerd.io docker-compose-plugin&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Pull The Official Docker Image and run it&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;1) $ &lt;code&gt;docker pull owncloud&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;2) $ &lt;code&gt;docker run -d -p 80:80 owncloud&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Now you can access owncloud by entering your server ip in browser.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Stay ahead on privacy with temporary E-mail</title>
      <dc:creator>RICK SANCHEZ</dc:creator>
      <pubDate>Wed, 17 Aug 2022 17:46:00 +0000</pubDate>
      <link>https://dev.to/rickc137/stay-ahead-on-privacy-with-temporary-e-mail-3npa</link>
      <guid>https://dev.to/rickc137/stay-ahead-on-privacy-with-temporary-e-mail-3npa</guid>
      <description>&lt;p&gt;Temporary email is a service which provides disposable temporary email addresses which delete itself after a certain time. Many websites and forums on the internet ask for your email addresses in exchange for visiting their page or to download files. These websites may or may not be a secure enough website, where they might trade your email with companies for their own profit. &lt;br&gt;
          Most insecure websites are always victims of data breaches and when you provide your personal/business email in an insecure website, your email can be an easy  target for hackers. Some websites even store your password in clear text, which when many of us reuse our passwords, makes our mail vulnerable to hackers.&lt;br&gt;
         The best way to prevent this is to use a temporary email address. By using a  temporary email address, you are secure, anonymous, spam-free and you can also  keep the inbox of your real email clean. I personally use, “temp-mail.org” for temporary  email service. So next time a website asks for your email address, try using a temporary  mail id and you will see less spam emails in your spam box.&lt;/p&gt;

&lt;p&gt;PRO TIP&lt;br&gt;
         Use temporary email addresses on websites which provide free trials or limited  access per day. When your trial or a specific day’s access time has expired, you can log  out and sign in again with another temporary email address and prolong the access you  have to the websites. I use this on, “pngtree”, which is a website where you can  download png images. Only a premium member can download unlimited png images,  where for a free user, it’s only two images per day. I can download unlimited by using  temporary email addresses. You can also use this on, “TunnelBear” and get good VPN  service for free. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://temp-mail.org/en/"&gt;Tempmail&lt;/a&gt;&lt;/p&gt;

</description>
      <category>privacy</category>
    </item>
  </channel>
</rss>
