Metatwo hackthebox writeup
Easy linux machine in which we exploit a couple wordpress vulneravilties and crack a couple hashes
Easy linux machine in which we exploit a couple wordpress vulneravilties and crack a couple hashes
Easy linux machine in which we inject NoSQL code, crack a password, reverse engineer a binary and escalate through docker
Easy linux machine in which we find exposed credentials, exploit a RCE and privilege escalate with PATH manipulation
Easy linux machine in which we exploit and LFI, poison logs to get RCE, and escalate with both crontab and $PATH
Short post in which I explain how to use java with sudo or with the SUID bit to privilege escalate
Medium linux machine in which we exploit a non-secure change password functionality, upload malicious files, interact with mongodb and exploit insecure LD_PRELOAD
Very easy linux machine in which we upload a malicious php plugin to wordpress, bruteforce a user’s password and find unexpected files in the system
In this article I will share my experience of learning some hacking during my 3 months of summer vacation and criticly analyze if I took the right path. Then I will try and give my best advice.
Very easy linux machine in which we exploit a LFI to get RCE and abuse a SUID binary
Very easy linux machine in which we bruteforce credentials and exploit a SUID binary