Explore >> Select a destination


You are here

blog.ikuamike.io
| | highon.coffee
1.7 parsecs away

Travel
| | LFI Explained and the techniques to leverage a shell from a local file inclusion vulnerability. How to get a shell from LFI
| | danielsieger.com
1.5 parsecs away

Travel
| | A short guide on creating a Jekyll template using Bootstrap and Sass.
| | blog.0x7d0.dev
2.9 parsecs away

Travel
| | Bookworm is an Insane-difficulty machine from Hack The Box. We will exploit an XSS vulnerability to gain access to a grandfathered feature accessible only to a few users. Subsequently, we'll leverage a Path Traversal vulnerability to acquire an initial password. Then, we will exploit a bug in an internal HTTP service to pivot to another user. This second user will possess privileges to a system for generating shipping labels, vulnerable to a double injection, allowing us to escalate our privileges to root.
| | digwp.com
30.7 parsecs away

Travel
| This is a common question I get from folks in the WordPress community. How can I "lock things down" and prevent any changes to plugins, themes, and...