Explore >> Select a destination


You are here

blog.g0tmi1k.com
| | blog.ikuamike.io
12.2 parsecs away

Travel
| | Difficulty Release Date Author Beginner 15 Feb 2020 Love Summary In this box there's only one port open that is running a vulnerable version of sar2html that we take advantage of to get a low priv shell. For privilege escalation there was a cron job running as root that was running a script we could write in. Reconnaissance Nmap Nmap scan report for 192.168.56.107 Host is up (0.000040s latency). Not shown: 65534 closed ports PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.
| | www.welivesecurity.com
13.5 parsecs away

Travel
| | The website of a Hong Kong pro-democracy radio station was compromised to serve a Safari exploit that installed cyberespionage malware on visitors' Macs.
| | taeluralexis.com
8.9 parsecs away

Travel
| | In this writeup, we'll exploit a Linux machine on Hack The Box with CVE-2023-46604, leveraging Java deserialization for remote code execution.
| | suraj.io
84.5 parsecs away

Travel
| Note on Linux Kernel capabilities