Kioptrix: Level 1.2 (#3) – Vulnhub Writeup

Source: https://www.vulnhub.com/entry/kioptrix-level-12-3,24/

The next one up in the Kioptrix series!  According to the Kioptrix 1.2 blog entry we will just need to make a quick modification to our hosts file to get the webapp working.  As far as getting this up in VirtualBox I didn’t have to do anything special except add the VMDK as a IDE hard drive.

Let’s go ahead and start with an nmap host discovery scan and then we can map the IP to “kioptrix3.com” as instructed in the post.

nmap 192.168.111.0/24 -sP

Continue reading “Kioptrix: Level 1.2 (#3) – Vulnhub Writeup”

Kioptrix: Level 1.1 (#2) – Vulnhub Writeup

Source: https://www.vulnhub.com/entry/kioptrix-level-11-2,23/

For this next vulnhub writeup in the Kioptrix series I’m going to try and stick to a couple ground rules to both keep difficulty up and to aid a little in my own person learning;

1.  No exploits used outside of a 30 day window of VM release date – in this case 11 Feb 2011

2.  Try to stick as much as possible to more manual exploit techniques.

With that let’s get started…

Start off as always with an initial host discovery scan via nmap:

nmap 192.168.111.0/24 -sP

Continue reading “Kioptrix: Level 1.1 (#2) – Vulnhub Writeup”

Kioptrix: Level 1 – Vulnhub Writeup

Source: https://www.vulnhub.com/entry/kioptrix-level-1-1,22/

I took a little break to try out hackthebox.eu (which I highly recommend!).  Unfortunately due to the member rules I won’t be posting any writeups for the vulnerable machines there.  Also ended up switching over to Arch Linux on my main lab workstation so that ended up consuming a lot of time getting setup again.

I’m planning on going through the entire series of Kioptrix Vulnhub VMs as they’re often recommended as additional practice for OSCP.  And with that…let’s get started on part 1 of the series!

Starting with the typical nmap host discovery scan to detect the IP:

nmap 192.168.111.0/24 -sP Continue reading “Kioptrix: Level 1 – Vulnhub Writeup”

Ad-blocking in pfSense with DNSBL

I’m already a big fan of the browser extensions uBlock Origin (ad-blocking) and Ghostery (anti-tracking), but was looking to accomplish some (if not all) of what they do in a seamless way in pfSense.  This will be a work in progress but using DNSBL in pfSense I’ve begun by utilizing the following block lists:

All lists that are incorporated into pi-hole by default:

##StevenBlack’s list
https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts

##MalwareDomains
https://mirror1.malwaredomains.com/files/justdomains

Continue reading “Ad-blocking in pfSense with DNSBL”