|
You are here |
rot256.dev | ||
| | | | |
gtfobins.github.io
|
|
| | | | | [AI summary] The content provides Perl scripts and commands for creating reverse shells and exploiting SUID and sudo privileges to gain system access. | |
| | | | |
blog.ikuamike.io
|
|
| | | | | Summary Over the weekend I participated in Metasploit Community December CTF by Rapid7 with team fr334aks . We ended up getting position 57/413. The CTF was meant to be beginner-friendly. Intro Teams are provided with their own instance of a kali box which is public facing to act as a jump host to reach an ubuntu VM which hosts the challenges. On the ubuntu VM there are 20 open ports for each challenge. | |
| | | | |
www.justus.pw
|
|
| | | | | [AI summary] The user successfully gained access to a system by exploiting a Heartbleed vulnerability, decrypted an RSA key using a password obtained from memory, and then used that key to log in as the 'hype' user. After enumerating the system, they accessed a Tmux session to gain root access and retrieved the root flag. | |
| | | | |
gist.github.com
|
|
| | | Docker Compose FIle For Wordpress, MySQL & phpmyadmin - docker_wordpress.md | ||