infraeasy

GreenEdge

hackerlab

Task: Pentest GreenEdge internal portal on Linux. Solution: OS command injection via feedback form, then privilege escalation using Python with cap_setuid capability to become root.

$ ls tags/ techniques/
OS command injection via web formLinux capabilities exploitation (cap_setuid on Python)Privilege escalation from www-data to root

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]