webPromedium
Resourcehub Core
necronet
Task: Web application with file upload functionality. Solution: Exploited path traversal in file upload to overwrite routes.js, achieved RCE, then uploaded patched version to pass verification and obtain root-protected flag.
$ ls tags/ techniques/
arbitrary-file-overwriteroute-hijackingpatch-verification-bypass
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][free]AgriWeb— hackthebox
- [web][Pro]Powergrid Challenge— necronet
- [web][Pro]Lab 29 — PackForge — Path Traversal to RCE via Template Injection— hackadvisor
- [web][Pro]board_of_secrets— miptctf
- [web][Pro]Lab 352 — PipeForge — Content-Type Confusion to Admin JWT Forge to RCE— hackadvisor