MonitorsTwo hackthebox writeup
Easy linux machine in which we hack cacti with a CVE, get credentials from a SQL database, and exploit a docker CVE to escalate privileges
hackthebox CVE MySQL docker SUIDEasy linux machine in which we hack cacti with a CVE, get credentials from a SQL database, and exploit a docker CVE to escalate privileges
hackthebox CVE MySQL docker SUIDEasy linux machine in which we hack gRPC via SQL injection and escalate privileges thanks to a pyload CVE
hackthebox gRPC SQL injection CVE pyloadEasy linux machine in which we exploit a known vulnerability,find plaintext credentials, and abuse a relative path
hackthebox RCE git gitea dockerEasy linux machine in which we exploit a CVE found plaintext credentials adn privesc with ansible
hackthebox cron ansible LFI RCEMedium linux machine in which we get LFI forge our own flask token, exploit Chrome in debug mode and use a sudo CVE to privesc
hackthebox cron LFI flaskMedium linux machine in which we exploit a CVE get credentials to a MySQL db then get ssh credentials and lastly find a consul token in a git repository to get root
hackthebox MySQL git port forwarding grafana consulEasy linux machine in which we find a subdomain, bypass a login, get LFI thanks to XSS and escalate privileges via missconfiguration
hackthebox fuzzing NoSQL injection XSS LFI sudoEasy linux machine in which we upload malicious files, we do a sqli in a websocket and privesc thanks to doas and dstat
hackthebox fuzzing MySQL SQL injection websocket doasSimple yet didactic reverse engineering challenge
hackthebox challenge reverse engineeringReally easy linux machine in which we exploit a pdfkit RCE, find plaintext credentials and escalate thanks to a .yaml file
hackthebox RCEEasy linux machine in which we exploit a couple wordpress vulneravilties and crack a couple hashes
hackthebox SQL injection ftp wordpressEasy linux machine in which we inject NoSQL code, crack a password, reverse engineer a binary and escalate through docker
hackthebox NoSQL fuzzing reverse engineering dockerEasy linux machine in which we find exposed credentials, exploit a RCE and privilege escalate with PATH manipulation
hackthebox PATH fuzzing RCEIn this article I will share my experience of learning some hacking during my 3 months of summer vacation and criticly analyze if I took the right path. Then I will try and give my best advice.
ctf hackthebox tryhackme vulnhub picoctfMedium linux machine in which we exploit flask-JWT we create a Bash script, exploit a RCE and get root with MySQL
hackthebox JWT flask MySQL bash scriptingMedium linux machine in which we use SQL injection, exploit ipython and redis
hackthebox SQL injection ipython redisMedium linux machine in which we exploit mpdf with a bash script and escalate with gdb thanks to a capability
hackthebox mpdf capabilities gdb bash scriptingEasy linux machine in which we enumerate dns, fuzz subdomains, exploit and LFI, and exploit fail2ban
hackthebox mpdf capabilities gdb bash scriptingEasy linux machine in which we overwrite the app code with a malicious file name and changed a .githooks file
hackthebox flask port forwarding code revision gitea gitEasy linux machine in which we exploit flask and edit a script that gets executed by root
hackthebox flask PATHEasy linux machine in which we exploit an old wordpress version and the polkit exploit
hackthebox wordpress polkitEasy linux machine in which we exploit strapi and forward a lavarel port to exploit it
hackthebox strapi port forwardingEasy linux machine in which we hack a JWT, take advatage of the exec function and read files with a SUID binary
hackthebox git JWT code reviewEasy linux machine in which we take advantage of the exec function, crack a hash and manipulate the $PATH
hackthebox code review PATH MySQLEasy linux machine in which we find a subdomain, bypass a login, get LFI thanks to XSS and escalate privileges via missconfiguration
hackthebox fuzzing NoSQL injection XSS LFI sudoEasy linux machine in which we upload malicious files, we do a sqli in a websocket and privesc thanks to doas and dstat
hackthebox fuzzing MySQL SQL injection websocket doasEasy linux machine in which we inject NoSQL code, crack a password, reverse engineer a binary and escalate through docker
hackthebox NoSQL fuzzing reverse engineering dockerEasy linux machine in which we find exposed credentials, exploit a RCE and privilege escalate with PATH manipulation
hackthebox PATH fuzzing RCEVery easy linux machine in which we bruteforce credentials and exploit a SUID binary
vulnhub wordpress fuzzing bruteforcingEasy linux machine in which we exploit a RCE and an old linux version
vulnhub bash scripting fuzzing ftpEasy linux machine in which we bruteforce credentials and abuse a SUID binary
vulnhub wordpress fuzzing bruteforceVery easy linux machine in which we upload a malicious php plugin to wordpress, bruteforce a user’s password and find unexpected files in the system
vulnhub bash scripting bruteforcing wordpressIn this article I will share my experience of learning some hacking during my 3 months of summer vacation and criticly analyze if I took the right path. Then I will try and give my best advice.
ctf hackthebox tryhackme vulnhub picoctfVery easy linux machine in which we exploit a LFI to get RCE and abuse a SUID binary
vulnhub log poisoning bruteforcingVery easy linux machine in which we bruteforce credentials and exploit a SUID binary
vulnhub wordpress fuzzing bruteforcingEasy linux machine in which we exploit a RCE and an old linux version
vulnhub bash scripting fuzzing ftpEasy linux machine in which we bruteforce credentials and abuse a SUID binary
vulnhub wordpress fuzzing bruteforceEasy linux machine in which we hack cacti with a CVE, get credentials from a SQL database, and exploit a docker CVE to escalate privileges
hackthebox CVE MySQL docker SUIDMedium linux machine in which we exploit a CVE get credentials to a MySQL db then get ssh credentials and lastly find a consul token in a git repository to get root
hackthebox MySQL git port forwarding grafana consulEasy linux machine in which we upload malicious files, we do a sqli in a websocket and privesc thanks to doas and dstat
hackthebox fuzzing MySQL SQL injection websocket doasMedium linux machine in which we exploit flask-JWT we create a Bash script, exploit a RCE and get root with MySQL
hackthebox JWT flask MySQL bash scriptingEasy linux machine in which we take advantage of the exec function, crack a hash and manipulate the $PATH
hackthebox code review PATH MySQLEasy linux machine in which we exploit a couple wordpress vulneravilties and crack a couple hashes
hackthebox SQL injection ftp wordpressVery easy linux machine in which we upload a malicious php plugin to wordpress, bruteforce a user’s password and find unexpected files in the system
vulnhub bash scripting bruteforcing wordpressVery easy linux machine in which we bruteforce credentials and exploit a SUID binary
vulnhub wordpress fuzzing bruteforcingEasy linux machine in which we bruteforce credentials and abuse a SUID binary
vulnhub wordpress fuzzing bruteforceEasy linux machine in which we exploit an old wordpress version and the polkit exploit
hackthebox wordpress polkitVery easy linux machine in which we upload a malicious php plugin to wordpress, bruteforce a user’s password and find unexpected files in the system
vulnhub bash scripting bruteforcing wordpressEasy linux machine in which we exploit a RCE and an old linux version
vulnhub bash scripting fuzzing ftpMedium linux machine in which we exploit flask-JWT we create a Bash script, exploit a RCE and get root with MySQL
hackthebox JWT flask MySQL bash scriptingMedium linux machine in which we exploit mpdf with a bash script and escalate with gdb thanks to a capability
hackthebox mpdf capabilities gdb bash scriptingEasy linux machine in which we enumerate dns, fuzz subdomains, exploit and LFI, and exploit fail2ban
hackthebox mpdf capabilities gdb bash scriptingEasy linux machine in which we find exposed credentials, exploit a RCE and privilege escalate with PATH manipulation
hackthebox PATH fuzzing RCEEasy linux machine in which we exploit and LFI, poison logs to get RCE, and escalate with both crontab and $PATH
tryhackme LFI log poisoning cron PATHEasy linux machine in which we exploit flask and edit a script that gets executed by root
hackthebox flask PATHEasy linux machine in which we take advantage of the exec function, crack a hash and manipulate the $PATH
hackthebox code review PATH MySQLEasy linux machine in which we exploit a known vulnerability,find plaintext credentials, and abuse a relative path
hackthebox RCE git gitea dockerMedium linux machine in which we exploit a CVE get credentials to a MySQL db then get ssh credentials and lastly find a consul token in a git repository to get root
hackthebox MySQL git port forwarding grafana consulEasy linux machine in which we overwrite the app code with a malicious file name and changed a .githooks file
hackthebox flask port forwarding code revision gitea gitEasy linux machine in which we hack a JWT, take advatage of the exec function and read files with a SUID binary
hackthebox git JWT code reviewMedium linux machine in which we get LFI forge our own flask token, exploit Chrome in debug mode and use a sudo CVE to privesc
hackthebox cron LFI flaskMedium linux machine in which we exploit flask-JWT we create a Bash script, exploit a RCE and get root with MySQL
hackthebox JWT flask MySQL bash scriptingEasy linux machine in which we overwrite the app code with a malicious file name and changed a .githooks file
hackthebox flask port forwarding code revision gitea gitEasy linux machine in which we exploit flask and edit a script that gets executed by root
hackthebox flask PATHEasy linux machine in which we hack gRPC via SQL injection and escalate privileges thanks to a pyload CVE
hackthebox gRPC SQL injection CVE pyloadEasy linux machine in which we upload malicious files, we do a sqli in a websocket and privesc thanks to doas and dstat
hackthebox fuzzing MySQL SQL injection websocket doasEasy linux machine in which we exploit a couple wordpress vulneravilties and crack a couple hashes
hackthebox SQL injection ftp wordpressMedium linux machine in which we use SQL injection, exploit ipython and redis
hackthebox SQL injection ipython redisEasy linux machine in which we exploit a CVE found plaintext credentials adn privesc with ansible
hackthebox cron ansible LFI RCEMedium linux machine in which we get LFI forge our own flask token, exploit Chrome in debug mode and use a sudo CVE to privesc
hackthebox cron LFI flaskEasy linux machine in which we find a subdomain, bypass a login, get LFI thanks to XSS and escalate privileges via missconfiguration
hackthebox fuzzing NoSQL injection XSS LFI sudoEasy linux machine in which we exploit and LFI, poison logs to get RCE, and escalate with both crontab and $PATH
tryhackme LFI log poisoning cron PATHEasy linux machine in which we exploit a known vulnerability,find plaintext credentials, and abuse a relative path
hackthebox RCE git gitea dockerEasy linux machine in which we exploit a CVE found plaintext credentials adn privesc with ansible
hackthebox cron ansible LFI RCEReally easy linux machine in which we exploit a pdfkit RCE, find plaintext credentials and escalate thanks to a .yaml file
hackthebox RCEEasy linux machine in which we find exposed credentials, exploit a RCE and privilege escalate with PATH manipulation
hackthebox PATH fuzzing RCEMedium linux machine in which we exploit a CVE get credentials to a MySQL db then get ssh credentials and lastly find a consul token in a git repository to get root
hackthebox MySQL git port forwarding grafana consulEasy linux machine in which we overwrite the app code with a malicious file name and changed a .githooks file
hackthebox flask port forwarding code revision gitea gitEasy linux machine in which we exploit strapi and forward a lavarel port to exploit it
hackthebox strapi port forwardingVery easy linux machine in which we upload a malicious php plugin to wordpress, bruteforce a user’s password and find unexpected files in the system
vulnhub bash scripting bruteforcing wordpressVery easy linux machine in which we exploit a LFI to get RCE and abuse a SUID binary
vulnhub log poisoning bruteforcingVery easy linux machine in which we bruteforce credentials and exploit a SUID binary
vulnhub wordpress fuzzing bruteforcingEasy linux machine in which we exploit and LFI, poison logs to get RCE, and escalate with both crontab and $PATH
tryhackme LFI log poisoning cron PATHMedium linux machine in which we exploit a non-secure change password functionality, upload malicious files, interact with mongodb and exploit insecure LD_PRELOAD
tryhackme LD_PRELOAD mongodb uploading filesIn this article I will share my experience of learning some hacking during my 3 months of summer vacation and criticly analyze if I took the right path. Then I will try and give my best advice.
ctf hackthebox tryhackme vulnhub picoctfEasy linux machine in which we exploit a CVE found plaintext credentials adn privesc with ansible
hackthebox cron ansible LFI RCEMedium linux machine in which we get LFI forge our own flask token, exploit Chrome in debug mode and use a sudo CVE to privesc
hackthebox cron LFI flaskEasy linux machine in which we exploit and LFI, poison logs to get RCE, and escalate with both crontab and $PATH
tryhackme LFI log poisoning cron PATHEasy linux machine in which we hack cacti with a CVE, get credentials from a SQL database, and exploit a docker CVE to escalate privileges
hackthebox CVE MySQL docker SUIDEasy linux machine in which we exploit a known vulnerability,find plaintext credentials, and abuse a relative path
hackthebox RCE git gitea dockerEasy linux machine in which we inject NoSQL code, crack a password, reverse engineer a binary and escalate through docker
hackthebox NoSQL fuzzing reverse engineering dockerEasy linux machine in which we hack a JWT, take advatage of the exec function and read files with a SUID binary
hackthebox git JWT code reviewEasy linux machine in which we take advantage of the exec function, crack a hash and manipulate the $PATH
hackthebox code review PATH MySQLMedium linux machine in which we exploit flask-JWT we create a Bash script, exploit a RCE and get root with MySQL
hackthebox JWT flask MySQL bash scriptingEasy linux machine in which we hack a JWT, take advatage of the exec function and read files with a SUID binary
hackthebox git JWT code reviewEasy linux machine in which we exploit a known vulnerability,find plaintext credentials, and abuse a relative path
hackthebox RCE git gitea dockerEasy linux machine in which we overwrite the app code with a malicious file name and changed a .githooks file
hackthebox flask port forwarding code revision gitea gitMedium linux machine in which we exploit mpdf with a bash script and escalate with gdb thanks to a capability
hackthebox mpdf capabilities gdb bash scriptingEasy linux machine in which we enumerate dns, fuzz subdomains, exploit and LFI, and exploit fail2ban
hackthebox mpdf capabilities gdb bash scriptingMedium linux machine in which we exploit mpdf with a bash script and escalate with gdb thanks to a capability
hackthebox mpdf capabilities gdb bash scriptingEasy linux machine in which we enumerate dns, fuzz subdomains, exploit and LFI, and exploit fail2ban
hackthebox mpdf capabilities gdb bash scriptingMedium linux machine in which we exploit mpdf with a bash script and escalate with gdb thanks to a capability
hackthebox mpdf capabilities gdb bash scriptingEasy linux machine in which we enumerate dns, fuzz subdomains, exploit and LFI, and exploit fail2ban
hackthebox mpdf capabilities gdb bash scriptingEasy linux machine in which we exploit a couple wordpress vulneravilties and crack a couple hashes
hackthebox SQL injection ftp wordpressEasy linux machine in which we exploit a RCE and an old linux version
vulnhub bash scripting fuzzing ftpEasy linux machine in which we exploit and LFI, poison logs to get RCE, and escalate with both crontab and $PATH
tryhackme LFI log poisoning cron PATHVery easy linux machine in which we exploit a LFI to get RCE and abuse a SUID binary
vulnhub log poisoning bruteforcingEasy linux machine in which we find a subdomain, bypass a login, get LFI thanks to XSS and escalate privileges via missconfiguration
hackthebox fuzzing NoSQL injection XSS LFI sudoShort post in which I explain how to use java with sudo or with the SUID bit to privilege escalate
real life java sudo SUIDEasy linux machine in which we hack cacti with a CVE, get credentials from a SQL database, and exploit a docker CVE to escalate privileges
hackthebox CVE MySQL docker SUIDShort post in which I explain how to use java with sudo or with the SUID bit to privilege escalate
real life java sudo SUIDSimple yet didactic reverse engineering challenge
hackthebox challenge reverse engineeringEasy linux machine in which we inject NoSQL code, crack a password, reverse engineer a binary and escalate through docker
hackthebox NoSQL fuzzing reverse engineering dockerEasy linux machine in which we hack cacti with a CVE, get credentials from a SQL database, and exploit a docker CVE to escalate privileges
hackthebox CVE MySQL docker SUIDEasy linux machine in which we hack gRPC via SQL injection and escalate privileges thanks to a pyload CVE
hackthebox gRPC SQL injection CVE pyloadEasy linux machine in which we exploit strapi and forward a lavarel port to exploit it
hackthebox strapi port forwardingEasy linux machine in which we exploit an old wordpress version and the polkit exploit
hackthebox wordpress polkitEasy linux machine in which we overwrite the app code with a malicious file name and changed a .githooks file
hackthebox flask port forwarding code revision gitea gitMedium linux machine in which we use SQL injection, exploit ipython and redis
hackthebox SQL injection ipython redisMedium linux machine in which we use SQL injection, exploit ipython and redis
hackthebox SQL injection ipython redisEasy linux machine in which we bruteforce credentials and abuse a SUID binary
vulnhub wordpress fuzzing bruteforceIn this article I will share my experience of learning some hacking during my 3 months of summer vacation and criticly analyze if I took the right path. Then I will try and give my best advice.
ctf hackthebox tryhackme vulnhub picoctfIn this article I will share my experience of learning some hacking during my 3 months of summer vacation and criticly analyze if I took the right path. Then I will try and give my best advice.
ctf hackthebox tryhackme vulnhub picoctfMedium linux machine in which we exploit a non-secure change password functionality, upload malicious files, interact with mongodb and exploit insecure LD_PRELOAD
tryhackme LD_PRELOAD mongodb uploading filesMedium linux machine in which we exploit a non-secure change password functionality, upload malicious files, interact with mongodb and exploit insecure LD_PRELOAD
tryhackme LD_PRELOAD mongodb uploading filesMedium linux machine in which we exploit a non-secure change password functionality, upload malicious files, interact with mongodb and exploit insecure LD_PRELOAD
tryhackme LD_PRELOAD mongodb uploading filesShort post in which I explain how to use java with sudo or with the SUID bit to privilege escalate
real life java sudo SUIDShort post in which I explain how to use java with sudo or with the SUID bit to privilege escalate
real life java sudo SUIDEasy linux machine in which we inject NoSQL code, crack a password, reverse engineer a binary and escalate through docker
hackthebox NoSQL fuzzing reverse engineering dockerSimple yet didactic reverse engineering challenge
hackthebox challenge reverse engineeringEasy linux machine in which we upload malicious files, we do a sqli in a websocket and privesc thanks to doas and dstat
hackthebox fuzzing MySQL SQL injection websocket doasEasy linux machine in which we upload malicious files, we do a sqli in a websocket and privesc thanks to doas and dstat
hackthebox fuzzing MySQL SQL injection websocket doasEasy linux machine in which we find a subdomain, bypass a login, get LFI thanks to XSS and escalate privileges via missconfiguration
hackthebox fuzzing NoSQL injection XSS LFI sudoEasy linux machine in which we find a subdomain, bypass a login, get LFI thanks to XSS and escalate privileges via missconfiguration
hackthebox fuzzing NoSQL injection XSS LFI sudoMedium linux machine in which we exploit a CVE get credentials to a MySQL db then get ssh credentials and lastly find a consul token in a git repository to get root
hackthebox MySQL git port forwarding grafana consulMedium linux machine in which we exploit a CVE get credentials to a MySQL db then get ssh credentials and lastly find a consul token in a git repository to get root
hackthebox MySQL git port forwarding grafana consulEasy linux machine in which we exploit a CVE found plaintext credentials adn privesc with ansible
hackthebox cron ansible LFI RCEEasy linux machine in which we hack gRPC via SQL injection and escalate privileges thanks to a pyload CVE
hackthebox gRPC SQL injection CVE pyloadEasy linux machine in which we hack gRPC via SQL injection and escalate privileges thanks to a pyload CVE
hackthebox gRPC SQL injection CVE pyload