webeasy
Crawler
hackerlab
Task: Web crawler application with login. Solution: Brute-forced credentials (admin:qqq111), then exploited Command Injection via unsanitized URL parameter passed to shell_exec().
$ ls tags/ techniques/
command_injectionrcephpapacheunsanitized_inputsemicolon_injectionshell_execcredential_bruteforceweb_crawlerpipe_injection
Credential brute-forcing (admin:qqq111)Command Injection via unsanitized shell_exec() inputFilesystem enumerationPipe (|) and semicolon (;) injection
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]