pwnmedium
KHP Protocol Challenge Scenario
hackthebox
Task: a custom threaded TCP protocol server exposed key-management commands and an EXEC path guarded by admin state. Solution: groom an empty key database, trigger the RegisterNewKey heap overflow with a forged profile, authenticate the corrupted admin entry, then use a second connection to EXEC and read flag.txt.
$ ls tags/ techniques/
heap_overflow_profile_forgeryempty_database_heap_groomingshared_global_auth_abusecross_connection_exec
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]