Explore >> Select a destination


You are here

blog.superautomation.co.uk
| | highon.coffee
10.9 parsecs away

Travel
| | LFI Explained and the techniques to leverage a shell from a local file inclusion vulnerability. How to get a shell from LFI
| | blog.ikuamike.io
9.8 parsecs away

Travel
| | Difficulty Release Date Author Beginner 2 Mar 2020 Zayotic Summary In this box, we first perform ldap injection on the web application to bypass the login page. Then we are able to read local files by abusing a local file inclusion vulnerability with php base64 filter. From one of the php files we get ldap credentials that we used to authenticate to ldap and dump entries. From the entries we get a base64 encoded password that we could use to ssh into the machine.
| | taeluralexis.com
13.1 parsecs away

Travel
| | In this writeup, we'll exploit a Linux machine on Hack The Box with CVE-2023-46604, leveraging Java deserialization for remote code execution.
| | blog.talosintelligence.com
78.7 parsecs away

Travel
| As the Akira ransomware group continues to evolve its operations, Talos has the latest research on the group's attack chain, targeted verticals, and potential future TTPs.