infraProeasy
Будущий релиз (Future Release)
hackerlab
Task: Pentest machine with web service and SSH access, hint about development version. Solution: Directory fuzzing found /v2/ with LFI in image.php, extracted credentials from .bash_history, SSH access, privilege escalation via SUID capsh binary.
$ ls tags/ techniques/
lficredential_leakapachelocal_file_inclusionsshdirectory_fuzzingffufbash_historysuidcapshprivilege_escalationdevelopment_version
Directory fuzzing with ffufLocal File Inclusion via image.php parameterCredential harvesting from .bash_historySUID binary exploitation (capsh)
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [infra][Pro]SecretShell— alfactf
- [infra][Pro]Секретный кабинет (Secret Cabinet)— hackerlab
- [web][Pro]Доступ запрещён (Access Denied)— hackerlab
- [web][Pro]Секрет (Secret)— hackerlab
- [infra][Pro]Ламер (Lamer)— hackerlab