inframedium
Черновик (Chernovik)
hackerlab
Task: Pentest machine with web (Apache) and SSH services. Solution: Exploited preg_replace /e modifier for RCE, cracked SHA-512 password hash with John, then used bash arithmetic injection in sudo script for root access.
$ ls tags/ techniques/
linuxapachepreg_replace_ephp_rcepassword_crackingsha512_cryptjohn_the_ripperbash_arithmetic_injectionsudo_privescssh
preg_replace /e modifier RCESHA-512 crypt password hash crackingBash arithmetic evaluation injection in [[ ]]sudo privilege escalation
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]