Skip to content

Tan-JunWei/Ethically_Hacking

Repository files navigation

EH (Ethical Hacking)

EH (Ethical Hacking) is a module in Semester 2.1 of the Cybersecurity and Digital Forensics (CSF) course in Ngee Ann Polytechnic (NP). This module focuses on advanced offensive security concepts, simulating real-world cyberattacks to assess and improve system and network defenses. It covers the complete attack lifecycle, including reconnaissance, exploitation, privilege escalation, and post-exploitation.

Table of Contents

  1. EH (Ethical Hacking)
  2. Overview
  3. Vulnerabilities
  4. Post-Exploitation Techniques
  5. Strengths of the Attack

Overview

This repository documents a complete red team attack simulation against BiteInstall, a simulated enterprise network with:

  • Ubuntu server running BuilderEngine CMS.
  • Windows AD network with Windows 10 workstation & Windows Server 2022 Domain Controller.
  • Palo Alto NGFW VM-Series 10.1 enforcing segmentation.

The attack chain:

  1. Recon & exploitation of CVE-2025-34100 (BuilderEngine CMS file upload RCE).
  2. Privilege escalation with CVE-2025-32462 (Sudo Host Option bypass).
  3. Firewall segmentation bypass via Ligolo tunneling & route manipulation.
  4. Active Directory exploitation (AS-REP Roasting, Kerberoasting, Silver Ticket, DC Sync, Golden Ticket).
  5. Post-exploitation persistence with Linux kernel rootkit, Windows WMI Event Subscription, spyware implant, and clearing of logs.

Vulnerabilities

CVE-2025-34100 – BuilderEngine CMS Unauthenticated Arbitrary File Upload

CVE-2025-32462 – Sudo Host Option Privilege Escalation

  • CVSS v3.x: 8.8 High
  • Bypasses hostname-based sudo restrictions.
  • Escalation from user shell to root.

Network Diagram

Network Diagram

Network Diagram


Post-Exploitation Techniques

  • Linux Rootkit
  • WMI Event Subscription
  • Custom Spyware

Strengths of the Attack

  • Zero user interaction
  • Bypass NGFW segmentation
  • AV evasion
  • Full Domain Compromise
  • Multiple persistence layers
  • Data exfiltration
  • Linux Kernel Rootkit

About

A repository containing tested scripts, tools, and relevant technical information for Ethical Hacking

Topics

Resources

Stars

Watchers

Forks

Contributors