Skip to content

Instantly share code, notes, and snippets.

#!/bin/bash
WID=$(wmctrl -lp | grep 'root@htb' | cut "-d " -f1)
FF=$(wmctrl -lp | grep 'Firefox' | cut "-d " -f1)
BURP=$(wmctrl -lp | grep 'Ippsec' | cut "-d " -f1)
WS=$(wmctrl -lp | grep 'ftp' | cut "-d " -f1)
wmctrl -i -r $FF -e 0,75,64,1798,936
wmctrl -i -r $WS -e 0,75,95,1798,938
Video: https://youtu.be/2OWtEymBQfA
1. Quick Assessment - Running Nessus and NMAP
-- Nessus primarily to see if it detects open KSQL (Spoiler: It doesn't)
-- NMAP to identify whatports are open
2. Seeing what is possible from an exposed KSQL/Kafka Port
-- Download and extract: https://github.com/Cyb3rWard0g/HELK/wiki/Deploy-KSQL-CLI-Locally
-- ./ksql http://172.16.10.10:8088
-- Run the commands: