infraProeasy
Ламер (Lamer)
hackerlab
Task: Pentest machine with web service and SSH. Solution: Default credentials on BoidCMS, CVE-2023-38836 file upload bypass with .phtml, MD5 hash cracking, privilege escalation via PHP cap_setuid capability.
$ ls tags/ techniques/
sqlitefile_uploadwebshellsshdefault_credentialsboidcmscve_2023_38836phtml_bypassmd5_crackinglinux_capabilitiescap_setuidphp_privesc
Default credentials exploitationBoidCMS CVE-2023-38836 file upload bypassMD5 hash cracking via online lookupLinux capabilities privilege escalation (cap_setuid on PHP)
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [infra][Pro]Подземелье (Dungeon)— hackerlab
- [infra][Pro]Будущий релиз (Future Release)— hackerlab
- [web][Pro]Easy Upload— hackerlab
- [infra][Pro]Секретный кабинет (Secret Cabinet)— hackerlab
- [infra][Pro]Скрипт-кидди (Script-kiddie)— hackerlab