pentestPromedium
Кибервоин (Cyberwarrior)
hackerlab
Task: Pentest machine with web service vulnerable to SQL injection behind WAF. Solution: Bypass WAF using MySQL comments, write webshell via SQLi, crack encrypted ZIP for SSH credentials, escalate privileges via sudo php.
$ ls tags/ techniques/
sql_injectionwaf_bypass_commentsfile_write_sqliwebshellzip2johnpassword_crackingsudo_php_privesc
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Базовая авторизация 3 — HackerLab— hackerlab
- [forensics][Pro]Investigation— taipanbyte
- [web][Pro]Dead or alive 4— spbctf
- [web][Pro]Базовая авторизация 2 (Basic Auth 2)— hackerlab
- [web][Pro]Dead or alive 5— spbctf