Explore >> Select a destination


You are here

leonjza.github.io
| | b.fl7.de
4.2 parsecs away

Travel
| | Technical solutions for the SANS Holiday Hack 2015, covering packet capture analysis, Local File Inclusion, NoSQL Injection, Remote Code Execution, binary exploitation & exploit development on Linux with gdb, bypassing canary and ASLR protection.
| | blog.ikuamike.io
4.2 parsecs away

Travel
| | Difficulty Release Date Author Beginner 29 June 2019 Zayotic Summary I got an OSCP voucher last year and this is my active effort to prep for it using TJ-Null's OSCP Prep list. Hopefully documenting this will help improve my methodology and get me ready for OSCP and beyond. In this box, initial access is through lfi to rce by using sending a payload in mail and accessing it.For privilege escalation we exploit a setuid binary that doesn't use absolute paths, therefore hijacking the path gives us root.
| | taeluralexis.com
4.9 parsecs away

Travel
| | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies.
| | www.uptycs.com
26.1 parsecs away

Travel
| Learn about the latest CUPS vulnerability in Linux systems, which poses a remote code execution risk. Discover mitigation strategies to secure your environment.