infraPromedium
Скрипт-кидди (Script-kiddie)
hackerlab
Task: Pentest machine with WordPress site requiring initial access and privilege escalation. Solution: Exploited CVE-2019-9978 in Social Warfare plugin for RCE, used password reuse for SSH access, then GTFOBins nano privesc via sudo to read root flag.
$ ls tags/ techniques/
WordPress plugin vulnerability exploitation (CVE-2019-9978)Password reuse (DB credentials → SSH)GTFOBins nano privilege escalationTwo-part flag assembly
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [infra][Pro]Подземелье (Dungeon)— hackerlab
- [infra][Pro]SREga CTF — 8-Level SRE Challenge— srega
- [web][Pro]Path Traversal— hackerdna
- [pentest][free]WingData (Wing FTP RCE → Python tarfile PATH_MAX bypass)— hackthebox
- [pentest][Pro]City (Информационный портал УК City)— standoff365