infraProeasy
GreenEdge
hackerlab
Task: Pentest GreenEdge internal portal on Linux. Solution: OS command injection via feedback form, then privilege escalation using Python with cap_setuid capability to become root.
$ ls tags/ techniques/
command_injectionphpapachelinux_capabilitiescap_setuidprivilege_escalationos_command_injectionpython_capabilitieswww-data_to_rootfeedback_form
OS command injection via web formLinux capabilities exploitation (cap_setuid on Python)Privilege escalation from www-data to root
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Crawler— hackerlab
- [pentest][Pro]Чайная кружка— hackerlab
- [web][Pro]Странный сервер (Strange Server)— hackerlab
- [pentest][free]Interpreter (Mirth Connect → f-string Injection)— hackthebox
- [web][Pro]Ping Pwn— hackerdna