Explore >> Select a destination


You are here

damienbod.com
| | dylanbeattie.net
8.0 parsecs away

Travel
| | Using ASP.NET Core and Azure OpenID Connect to restrict access to admin features based on an authenticated user's email domain.
| | dylanbeattie.net
7.6 parsecs away

Travel
| | Using ASP.NET Core and Azure OpenID Connect to restrict access to admin features based on an authenticated user's email domain.
| | az-liftshift.com
6.7 parsecs away

Travel
| | This article shows how an ASP.NET Core Razor Page application could implement an automatic sign-out when a user does not use the application for n-minutes. The application is secured using Azure AD B2C. To remove the session, the client must sign-out both on the ASP.NET Core application and the Azure AD B2C identity provider or
| | blog.ikuamike.io
73.1 parsecs away

Travel
| Difficulty Release Date Author Intermediate 18 July 2019 Zayotic Summary This box had quite a good number of misconfigurations and vulnerabilities. Initial access was through copying a shadow backup file to a smb share accessible anonymously using a file copy vulnerability in proftpd. Then lateral movement and privilege escalation was achieved by exploiting rce a locally running librenms instance and finally abusing sudo permissions on mysql to get root.