infraeasy
GreenEdge
hackerlab
Task: Pentest GreenEdge internal portal on Linux. Solution: OS command injection via feedback form, then privilege escalation using Python with cap_setuid capability to become root.
$ ls tags/ techniques/
command_injectionphpapachelinux_capabilitiescap_setuidprivilege_escalationos_command_injectionpython_capabilitieswww-data_to_rootfeedback_form
OS command injection via web formLinux capabilities exploitation (cap_setuid on Python)Privilege escalation from www-data to root
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]