infraPromedium

Черновик (Chernovik)

hackerlab

Task: Pentest machine with web (Apache) and SSH services. Solution: Exploited preg_replace /e modifier for RCE, cracked SHA-512 password hash with John, then used bash arithmetic injection in sudo script for root access.

$ ls tags/ techniques/
preg_replace /e modifier RCESHA-512 crypt password hash crackingBash arithmetic evaluation injection in [[ ]]sudo privilege escalation

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups