|
You are here |
leonjza.github.io | ||
| | | | |
www.mh4ckt3mh4ckt1c4s.xyz
|
|
| | | | | From HTB Business CTF 2022 | |
| | | | |
taeluralexis.com
|
|
| | | | | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies. | |
| | | | |
blog.ikuamike.io
|
|
| | | | | Difficulty Release Date Author Beginner 29 June 2019 Zayotic Summary I got an OSCP voucher last year and this is my active effort to prep for it using TJ-Null's OSCP Prep list. Hopefully documenting this will help improve my methodology and get me ready for OSCP and beyond. In this box, initial access is through lfi to rce by using sending a payload in mail and accessing it.For privilege escalation we exploit a setuid binary that doesn't use absolute paths, therefore hijacking the path gives us root. | |
| | | | |
blog.ropnop.com
|
|
| | | Catching a reverse shell over netcat is great...until you accidentally Ctrl-C and lose it. These techniques let you upgrade your shell to a proper TTY | ||