|
You are here |
blog.ikuamike.io | ||
| | | | |
highon.coffee
|
|
| | | | | LFI Explained and the techniques to leverage a shell from a local file inclusion vulnerability. How to get a shell from LFI | |
| | | | |
danielsieger.com
|
|
| | | | | A short guide on creating a Jekyll template using Bootstrap and Sass. | |
| | | | |
blog.0x7d0.dev
|
|
| | | | | Bookworm is an Insane-difficulty machine from Hack The Box. We will exploit an XSS vulnerability to gain access to a grandfathered feature accessible only to a few users. Subsequently, we'll leverage a Path Traversal vulnerability to acquire an initial password. Then, we will exploit a bug in an internal HTTP service to pivot to another user. This second user will possess privileges to a system for generating shipping labels, vulnerable to a double injection, allowing us to escalate our privileges to root. | |
| | | | |
digwp.com
|
|
| | | This is a common question I get from folks in the WordPress community. How can I "lock things down" and prevent any changes to plugins, themes, and... | ||