Fidjo La Koka
fidjolakoka.bsky.social
Fidjo La Koka
@fidjolakoka.bsky.social
🛡 Cybersecurity super novice 🛡
This made me realize that I’m the type of person who seeks quick wins or at least small, encouraging milestones to stay motivated.
December 27, 2024 at 7:55 AM
Moreover, it made me question and reconsider my interest in bin exp. This domain seems to demand a deep passion, given how challenging it is. As the speaker mentioned, months of research are often required—whereas I find myself overwhelmed after just a day or two of investigating a vulnerability 😅
December 27, 2024 at 7:55 AM
DLLICIOUS
December 24, 2024 at 11:02 AM
what a pleasure
December 24, 2024 at 11:00 AM
Wow impressive, the dll is spotted by only 4 vendors 🤯
December 24, 2024 at 10:57 AM
Oh, someone has found how to bypass AV
Let's try
fahmifj.github.io/articles/tes...
Testing PrintNightmare on HTB Machines
Having fun with a Zero-Day vulnerability
fahmifj.github.io
December 24, 2024 at 10:48 AM
Bastion has been Pwned. I still asking myself how to bypass AV for printnightmare
December 24, 2024 at 9:41 AM
Erf. It was just an SSH connection after getting the password. I ended up diving into a rabbit hole, trying to use PrintNightmare after failing to exploit EternalBlue.
December 23, 2024 at 10:17 PM
there is also cool function like hex-encode, hex-decode #parrotOS
December 23, 2024 at 6:11 PM
Did you know that by default we could use keyword `_` or `please` or `fucking` as alias for `sudo` ?
December 23, 2024 at 6:09 PM
Maybe 2025 will be different 👼
That said, I really appreciate the work of the HTB team. Supporting their business for another year feels worth it. Here’s to focusing on the positives!
December 23, 2024 at 3:26 PM
got the NTHASH and decrypt it.
After some unsuccessful attempts, i found an vuln which seems work against the box : printnightmare (CVE-2021-1675). However after following the exploitation process, i encountered an ERROR_VIRUS_INFECTED message. So, for the first time, i'll try to obfuscate a dll
December 21, 2024 at 8:40 PM
"In Windows we can find juicy stuff in System32, you can says it’s equivalent to /etc/ of linux" 💡

Okay, so i needed to get a file which is called SAM in Windows/System32/config
:)
Ok, let's continue
December 21, 2024 at 5:36 PM
but i feel like i'm close 😅
network scanned
smb open port found
connected with guest account
grap an vhd locally and mount it with guestmount
found an NTUSER.dat
and that's all.
Since i go round in circles
December 21, 2024 at 5:26 PM
stuck with no foothold. Have to take an hint 💁‍♂️
December 21, 2024 at 5:22 PM