Time to push myself. I decided to go for a “Medium to Hard” box, Tomato this time round. I’m really liking the boxes put forth by the SunCRS Team. This box really helped me solidify some tactics I struggled understand early on. Hopefully you learn something from this as well.
After my frustratingly fun adventure with Vulnhub’s Chili image, I decided to continue along and try another image from the SunCSR Team. The next image I found that was considered easy was Cherry. No hint this time. Sounds like a good time, doesn’t it? Let’s dive in! Information Gathering After discovering the IP address of my VM (192.168.1.39), I went to work running an nmap scan of the target system.
Thanks for checking out my first Vulnhub Box write up! I find these boxes really helpful as I start my journey into the world of cyber security. This is not going to be a traditional walkthrough. I’ll be documenting my entire (well…most) of my thought process, and where I went wrong. Since I’m just starting my journey into the realm of Cyber Security, I hope that some of my pitfalls will help others, and learn from my mistakes. While this one was considered easy, I found it frustrating, yet exciting. It’s always a great time when you get a chance to learn something new.
Hopefully this helps someone else, but it’s mostly for my own edification for
if when this issues happens again. This pertains to the Netgear Nighthawk X6 | Tri-Band WiFi Router | AC3200 (R8000) but I’m sure it apply to other (similar) routers. If you’ve ever used a Netgear router, you might not have been a big fan of it’s management UI. I wanted more control over my router so I opted to go for FreshTomato. After a few months, I decided to go through the upgrade process.
cowsayis an extremly fun and super easy to use command. Just put whatever you want as an argument after the command and you’ll be greated with an ASCII cow and a speech bubble saying it. This probably isn’t installed by default, so fire up your favorite package manager and install it!
I think it is now……week three of working from home. Rather than get into the nitty gritty of some standard UNIX command, I thought I’d take this week to introduce you to a few fun commands. Some of these are non-standard, and by that I mean they are usually not available by default on your system. So you’ll have install it, sorry. They can be installed with any package manager, I can confirm at least with
brewfor macOS and
aptfor Ubuntu/Debian. Let’s start this off with a funny little command called
Boy oh boy, where to begin with
grep. This one took me down a rabbit hole.
grepis one of those tools that I feel has always been there; like with
cd. It is a command I’ve come to rely on for almost anything I do on the command line. I will say this,
grepis powerful, like SUPER powerful. It’s so vast and complex that people have written multiple books about it. So before we dive in, remember that this is an overview. It won’t cover everything, because I cant. But I hope to give you some building blocks to which you can use to build greater things.
What a great name for a tool. Funny enough, there is a
dogcommand, but it’s not installed by default. The original
catcame with Unix version 1 in November 1971, and it replaced an older command called
pr. Believe it or not, chances are, the
prcommand is on your machine today! That’s a new one on me. The
prcommand has a different output format than
cat, making it a bit “prettier” because it offers a pagination filter. Anyway, back to