infraProeasy

GreenEdge

hackerlab

Task: Pentest GreenEdge internal portal on Linux. Solution: OS command injection via feedback form, then privilege escalation using Python with cap_setuid capability to become root.

$ ls tags/ techniques/
OS command injection via web formLinux capabilities exploitation (cap_setuid on Python)Privilege escalation from www-data to root

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups