inframedium

Черновик (Chernovik)

hackerlab

Task: Pentest machine with web (Apache) and SSH services. Solution: Exploited preg_replace /e modifier for RCE, cracked SHA-512 password hash with John, then used bash arithmetic injection in sudo script for root access.

$ ls tags/ techniques/
preg_replace /e modifier RCESHA-512 crypt password hash crackingBash arithmetic evaluation injection in [[ ]]sudo privilege escalation

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]