Explore >> Select a destination


You are here

sensepost.com
| | mazinahmed.net
3.6 parsecs away

Travel
| | Application and Infrastructure Security Engineering
| | blog.evanricafort.com
4.3 parsecs away

Travel
| | Information Security and Personal blog
| | adsecurity.org
6.8 parsecs away

Travel
| |
| | blog.ikuamike.io
66.4 parsecs away

Travel
| Difficulty Release Date Author Beginner 15 Feb 2020 Love Summary In this box there's only one port open that is running a vulnerable version of sar2html that we take advantage of to get a low priv shell. For privilege escalation there was a cron job running as root that was running a script we could write in. Reconnaissance Nmap Nmap scan report for 192.168.56.107 Host is up (0.000040s latency). Not shown: 65534 closed ports PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.