infraProeasy

Ламер (Lamer)

hackerlab

Task: Pentest machine with web service and SSH. Solution: Default credentials on BoidCMS, CVE-2023-38836 file upload bypass with .phtml, MD5 hash cracking, privilege escalation via PHP cap_setuid capability.

$ ls tags/ techniques/
Default credentials exploitationBoidCMS CVE-2023-38836 file upload bypassMD5 hash cracking via online lookupLinux capabilities privilege escalation (cap_setuid on PHP)

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups