Explore >> Select a destination


You are here

blog.superautomation.co.uk
| | highon.coffee
10.9 parsecs away

Travel
| | LFI Explained and the techniques to leverage a shell from a local file inclusion vulnerability. How to get a shell from LFI
| | eapolsniper.github.io
14.2 parsecs away

Travel
| |
| | blog.ikuamike.io
9.7 parsecs away

Travel
| | Difficulty Release Date Author Intermediate 20 Aug 2019 Zayotic Summary For this box, some directory bruteforce is needed to discover some php files. One of the php files has an lfi vulnerability but can only be access by authenticating to the other page. The login form can be bypassed and we exploit the lfi. For that we poison ssh logs for exploitation to rce. For privilege escalation we exploit a python web app running locally as root using insecure deserialization of the cookie by jsonpickle.
| | www.sysdig.com
51.3 parsecs away

Travel
| How does Sysdig measure up to SentinelOne on the critical aspects of cloud security? Read this article to see how the two platforms' features compare.