MonitorsTwo hackthebox writeup
Easy linux machine in which we hack cacti with a CVE, get credentials from a SQL database, and exploit a docker CVE to escalate privileges
Easy linux machine in which we hack cacti with a CVE, get credentials from a SQL database, and exploit a docker CVE to escalate privileges
Easy linux machine in which we hack gRPC via SQL injection and escalate privileges thanks to a pyload CVE
Easy linux machine in which we exploit a known vulnerability,find plaintext credentials, and abuse a relative path
Easy linux machine in which we exploit a CVE found plaintext credentials adn privesc with ansible
Medium linux machine in which we get LFI forge our own flask token, exploit Chrome in debug mode and use a sudo CVE to privesc
Medium linux machine in which we exploit a CVE get credentials to a MySQL db then get ssh credentials and lastly find a consul token in a git repository to get root
Easy linux machine in which we find a subdomain, bypass a login, get LFI thanks to XSS and escalate privileges via missconfiguration
Easy linux machine in which we upload malicious files, we do a sqli in a websocket and privesc thanks to doas and dstat
Simple yet didactic reverse engineering challenge
Really easy linux machine in which we exploit a pdfkit RCE, find plaintext credentials and escalate thanks to a .yaml file
Easy linux machine in which we exploit a couple wordpress vulneravilties and crack a couple hashes
Easy linux machine in which we inject NoSQL code, crack a password, reverse engineer a binary and escalate through docker
Easy linux machine in which we find exposed credentials, exploit a RCE and privilege escalate with PATH manipulation
Easy linux machine in which we exploit and LFI, poison logs to get RCE, and escalate with both crontab and $PATH
Short post in which I explain how to use java with sudo or with the SUID bit to privilege escalate
Medium linux machine in which we exploit a non-secure change password functionality, upload malicious files, interact with mongodb and exploit insecure LD_PRELOAD
Very easy linux machine in which we upload a malicious php plugin to wordpress, bruteforce a user’s password and find unexpected files in the system
In this article I will share my experience of learning some hacking during my 3 months of summer vacation and criticly analyze if I took the right path. Then I will try and give my best advice.
Very easy linux machine in which we exploit a LFI to get RCE and abuse a SUID binary
Very easy linux machine in which we bruteforce credentials and exploit a SUID binary
Easy linux machine in which we exploit a RCE and an old linux version
Easy linux machine in which we bruteforce credentials and abuse a SUID binary
Medium linux machine in which we exploit flask-JWT we create a Bash script, exploit a RCE and get root with MySQL
Medium linux machine in which we use SQL injection, exploit ipython and redis
Medium linux machine in which we exploit mpdf with a bash script and escalate with gdb thanks to a capability
Easy linux machine in which we enumerate dns, fuzz subdomains, exploit and LFI, and exploit fail2ban
Easy linux machine in which we overwrite the app code with a malicious file name and changed a .githooks file
Easy linux machine in which we exploit flask and edit a script that gets executed by root
Easy linux machine in which we exploit an old wordpress version and the polkit exploit
Easy linux machine in which we exploit strapi and forward a lavarel port to exploit it
Easy linux machine in which we hack a JWT, take advatage of the exec function and read files with a SUID binary
Easy linux machine in which we take advantage of the exec function, crack a hash and manipulate the $PATH