infraeasy

Ламер (Lamer)

hackerlab

Task: Pentest machine with web service and SSH. Solution: Default credentials on BoidCMS, CVE-2023-38836 file upload bypass with .phtml, MD5 hash cracking, privilege escalation via PHP cap_setuid capability.

$ ls tags/ techniques/
Default credentials exploitationBoidCMS CVE-2023-38836 file upload bypassMD5 hash cracking via online lookupLinux capabilities privilege escalation (cap_setuid on PHP)

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]