infraPromedium
Черновик (Chernovik)
hackerlab
Task: Pentest machine with web (Apache) and SSH services. Solution: Exploited preg_replace /e modifier for RCE, cracked SHA-512 password hash with John, then used bash arithmetic injection in sudo script for root access.
$ ls tags/ techniques/
linuxapachepreg_replace_ephp_rcepassword_crackingsha512_cryptjohn_the_ripperbash_arithmetic_injectionsudo_privescssh
preg_replace /e modifier RCESHA-512 crypt password hash crackingBash arithmetic evaluation injection in [[ ]]sudo privilege escalation
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [infra][Pro]Секретный кабинет (Secret Cabinet)— hackerlab
- [infra][Pro]Подземелье (Dungeon)— hackerlab
- [infra][Pro]Кто там?— hackerlab
- [infra][Pro]SecretShell— alfactf
- [web][Pro]Pryzhok— hackerlab