infraeasy

СМС (SMS)

hackerlab

Task: Pentest a Linux machine running Stock Management System (SMS) PHP application. Solution: UNION-based SQL injection to extract user credentials, MD5 hash cracking for SSH access, then privilege escalation via sudo NOPASSWD on /usr/bin/env (GTFOBins).

$ ls tags/ techniques/
UNION-based SQL injection in PHP applicationMD5 hash cracking via rainbow tablesSSH access with cracked credentialsPrivilege escalation via sudo env misconfiguration

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]