Explore >> Select a destination


You are here

www.gabriel.urdhr.fr
| | www.idontplaydarts.com
17.8 parsecs away

Travel
| | Using the PHP data URI for Remote File Inclusion.
| | www.trickster.dev
10.8 parsecs away

Travel
| | Code level discussion of web scraping, gray hat automation, growth hacking and bounty hunting
| | blog.rom1v.com
14.8 parsecs away

Travel
| |
| | blog.ikuamike.io
142.8 parsecs away

Travel
| Difficulty Release Date Author Beginner 29 June 2019 Zayotic Summary I got an OSCP voucher last year and this is my active effort to prep for it using TJ-Null's OSCP Prep list. Hopefully documenting this will help improve my methodology and get me ready for OSCP and beyond. In this box, initial access is through lfi to rce by using sending a payload in mail and accessing it.For privilege escalation we exploit a setuid binary that doesn't use absolute paths, therefore hijacking the path gives us root.