infraeasy

Будущий релиз (Future Release)

hackerlab

Task: Pentest machine with web service and SSH access, hint about development version. Solution: Directory fuzzing found /v2/ with LFI in image.php, extracted credentials from .bash_history, SSH access, privilege escalation via SUID capsh binary.

$ ls tags/ techniques/
Directory fuzzing with ffufLocal File Inclusion via image.php parameterCredential harvesting from .bash_historySUID binary exploitation (capsh)

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]