You are here |
adsecurity.org | ||
| | | |
blog.aghanim.net
|
|
| | | | ||
| | | |
www.deepinstinct.com
|
|
| | | | LSASS memory dump files aid attackers to swiftly extract credentials. Read an in-depth analysis of LSASS dumps as an attack vector & dumping methods. | |
| | | |
sensepost.com
|
|
| | | | Leaders in Information Security | |
| | | |
blog.ikuamike.io
|
|
| | Difficulty Release Date Author Intermediate 18 July 2019 Zayotic Summary This box had quite a good number of misconfigurations and vulnerabilities. Initial access was through copying a shadow backup file to a smb share accessible anonymously using a file copy vulnerability in proftpd. Then lateral movement and privilege escalation was achieved by exploiting rce a locally running librenms instance and finally abusing sudo permissions on mysql to get root. |