Explore >> Select a destination


You are here

leonjza.github.io
| | www.mh4ckt3mh4ckt1c4s.xyz
4.7 parsecs away

Travel
| | From HTB Business CTF 2022
| | taeluralexis.com
4.9 parsecs away

Travel
| | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies.
| | blog.ikuamike.io
4.2 parsecs away

Travel
| | Difficulty Release Date Author Beginner 29 June 2019 Zayotic Summary I got an OSCP voucher last year and this is my active effort to prep for it using TJ-Null's OSCP Prep list. Hopefully documenting this will help improve my methodology and get me ready for OSCP and beyond. In this box, initial access is through lfi to rce by using sending a payload in mail and accessing it.For privilege escalation we exploit a setuid binary that doesn't use absolute paths, therefore hijacking the path gives us root.
| | blog.ropnop.com
14.3 parsecs away

Travel
| Catching a reverse shell over netcat is great...until you accidentally Ctrl-C and lose it. These techniques let you upgrade your shell to a proper TTY