infraeasy
СМС (SMS)
hackerlab
Task: Pentest a Linux machine running Stock Management System (SMS) PHP application. Solution: UNION-based SQL injection to extract user credentials, MD5 hash cracking for SSH access, then privilege escalation via sudo NOPASSWD on /usr/bin/env (GTFOBins).
$ ls tags/ techniques/
sql_injectionphpsshmd5_crackinggtfobinsprivilege_escalationunion_based_sqlisudo_misconfigurationenv_privescstock_management_systemsourcecodester
UNION-based SQL injection in PHP applicationMD5 hash cracking via rainbow tablesSSH access with cracked credentialsPrivilege escalation via sudo env misconfiguration
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]