pentestProeasy
Сисадмин (Sysadmin)
hackerlab
Task: Linux pentest machine running a hospital website and Webmin panel, requiring root access to retrieve the flag. Solution: Extracted sysadmin username from image EXIF metadata, logged into Webmin with weak credentials, then exploited a SUID binary command injection vulnerability using IFS bypass for privilege escalation.
$ ls tags/ techniques/
exif_analysisweak_credentialsweb_shellsuid_exploitationifs_bypass
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [infra][Pro]Секретный кабинет (Secret Cabinet)— hackerlab
- [forensics][Pro]exFill— grodno_new_year_2026
- [forensics][Pro]Скрытый след (Hidden Trail)— hackerlab
- [forensics][Pro]Investigation— taipanbyte
- [stego][Pro]Locate and Neutralise— hackerlab