infraeasy
Будущий релиз (Future Release)
hackerlab
Task: Pentest machine with web service and SSH access, hint about development version. Solution: Directory fuzzing found /v2/ with LFI in image.php, extracted credentials from .bash_history, SSH access, privilege escalation via SUID capsh binary.
$ ls tags/ techniques/
lficredential_leakapachelocal_file_inclusionsshdirectory_fuzzingffufbash_historysuidcapshprivilege_escalationdevelopment_version
Directory fuzzing with ffufLocal File Inclusion via image.php parameterCredential harvesting from .bash_historySUID binary exploitation (capsh)
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]