TryHackMe! – RootMe | Walkthrough (Hands-on Hacking!)

Another hands-on hacking video I just released today!

This time we hack the RootMe computer on TryHackMe. I demonstrate the following strategies:

– Using nmap to scan the machine for open ports
– Using dirb and ffuf for directory enumeration
– Bypassing a .php upload restriction
– Using .php to set up a reverse shell for initial access to the machine
– Elevating from initial access to root by abusing a SUID setting

Enjoy!

TryHackMe! – Bounty Hacker | Walkthrough

Some more hands-on hacking! In this video, I demonstrate the following to hack an actual machine:

– Using nmap to scan for open ports
– Abusing an FTP server that allows anonymous login
– Using credentials I found on the FTP server to brute force SSH
– Elevating my initial shell to root access and officially “pwning” the machine

Enjoy!

Start Hacking Today! (Legally…)

Back with another video — in this video, I explain how YOU can begin hacking today without going to prison (which is kind of important).

I walk through setting up an account on TryHackMe, installing Kali Linux as a virtual machine, and connecting to a network with OpenVPN so you can practice real hacking techniques in a lab environment.

Enjoy!

An Autopsy of an Ex-Pastor

This was a tough video to make.

I am calling it an “Autopsy Of An Ex-Pastor”. I share very openly on how pastoral ministry went from being my dream career as a teenager to something that is now deeply painful.

Here’s a quick summary of the “death blows” I share about:

1. I was gifted beyond my emotional & spiritual maturity.
2. I did not embed myself in a robust support network.
3. I fell into the trap of human approval.
4. I rooted my identity in my “success” as a pastor.
5. I measured my ministry by the wrong metrics.

https://www.facebook.com/tylerramsbey22/videos/378579313789881

(No idea why my website will not embed the video so you’ll just have to click the direct link above to see it).

What Does Real Hacking Look Like?

What does real hacking look like?

In this video, I hack a web server running a vulnerable content management system. I use network scanning, SQL injection, PHP reverse shells, Metasploit, and much more. If you’ve ever been curious about what hacking actually looks like (rather than fake Hollywood depictions) – here you go.

Enjoy!

Print Nightmare – Step-by-Step Guide for Exploitation

One of the most infamous vulnerabilities from 2021 is known as “Print Nightmare.” This is a remote code execution vulnerability which means it allows an attacker to execute code on a server. It can be used as a pivot point for stealing credentials, launching ransomware, and various other malicious purposes. It abuses the Windows Printer Spooler as the entry point because the service runs with elevated privileges. This has been patched by Windows in July of 2021 but many servers remain unpatched and it continues to be exploited.

When evaluating a company’s security, ethical hackers will attempt known exploits and these often lead to root/admin access. Below is my step-by-step guide on exploiting Print Nightmare. You need to have knowledge of Kali Linux to perform this exploit. You also need a valid username and password on the server but it can be done with any user account.

1. Check if the server is vulnerable.

– rpcdump.py @<ip> | grep ‘MS-RPRN | MS-PAR’


2. Install latest version of Impacket


3. Grab the Python code from the Github page

URL: https://github.com/cube0x0/CVE-2021-1675


4. Create the .py exploit on your attacking machine

5. Create the malicious DLL on your attacking machine with msfvenom

6. Launch Metasploit and get a Meterpreter session started

7. Set the payload

8. Set the LPORT and LHOST (same as you did in step 5)

9. Type “run” to set up the listener.

10. Set up the SMB File share (new terminal window)

11. Run the python exploit

12. Get a Meterpreter shell as system!

  • This may get blocked by Windows Defender. You need to obfuscate the .dll file to perform AV bypassing

My Hacking Notebook

Hi everyone –

For the past year, I have been working on compiling a personal notebook for hacking/offensive security. This is the result of different classes I have taken, labs I’ve completed, and computers I have exploited (hosted on networks for this purpose – nothing illegal). The notebook is broken down into the following sections:

  • Information Gathering
  • Scanning & Enumeration
  • Exploitation Basics
  • Linux Privilege Escalation
  • Windows Privilege Escalation
  • Buffer Overflows
  • Burp Suite Guide

I am regularly updating this depending on what I am learning and wanted to share it for those who may be interested. Hopefully it goes without saying but please do not use any of this on a company network. If this is something you’re interested in, you can access networks for this specific purpose at tryhackme.com or hackthebox.com. This notebook is written from the usage of Kali Linux for penetration testing.

Here’s a link to the notebook:
Tyler’s Hacking Notebook

I Am Preaching This Sunday! (And a few other important updates!)

In many ways, my adult life can be marked by two seasons: pastoral ministry and post-pastoral ministry. As many of you know, I had the honor of serving the church through vocational ministry for about ten years. My last Sunday as a Lead Pastor was September 26th. Although it was a difficult decision to make, stepping down has been incredibly healing and I am in a much better place emotionally and spiritually as a result. For more of my reflections on this, go here – Life Outside of Pastoral Ministry

In this post, I want to share a few personal updates with you:

1. I am preaching this Sunday!
Although I do not serve vocationally as a pastor, I still love teaching the Bible and pointing people to Jesus. One of the ways I do this is by filling in for pastors in the area so they can have much needed rest. This Sunday I will be at The Rescue Church in Flandreau closing out their series on the 7 churches in Revelation by teaching on Jesus’ letter to the church in Laodicea. If you’re in the area, I’d be honored to have you join me – The service is at 10am!

2. We are becoming members at the United Church of Garretson!
I still believe the local church is vital in Jesus’ mission of reaching the world with the Gospel. The tendency of many people when they are looking for a new church is to find one that meets all of their theological distinctives with charismatic pastor(s) leading the congregation. On the contrary, I am a firm believer that you should worship at the closest church to your home. As a result, we have been getting plugged into the United Church of Garretson and walk to church every Sunday (it’s a few blocks from our home).

This is a small Methodist church led by Pastor Brian and Pastor Julie Gregg. They serve the church on a part-time basis – Brian works full-time at the University of Sioux Falls teaching theology and Julie mentors youth leaders and leads a spiritual direction ministry. My family has found this church very healing for our faith. As a result, we are pursuing membership and will become members in January (Lord willing).

3. Ashley and I have joined the United Kids Ministry Team!
Ava absolutely loves children’s church at the United Church of Garretson – known as United Kids (Elijah, on the other hand, is a little bit shy!). Ashley and I have signed up to serve and help lead this ministry as a means of serving the church. We are looking forward to teaching kids about Jesus and playing a role in helping them grow in their faith. The kids are currently studying The Jesus Storybook Bible – an excellent children’s Bible. It’s one that I purchased for my kids a few years ago because it connects every passage back to Jesus.

That’s all I have for now – have a great rest of your week!