pwnmedium

KHP Protocol Challenge Scenario

hackthebox

Task: a custom threaded TCP protocol server exposed key-management commands and an EXEC path guarded by admin state. Solution: groom an empty key database, trigger the RegisterNewKey heap overflow with a forged profile, authenticate the corrupted admin entry, then use a second connection to EXEC and read flag.txt.

$ ls tags/ techniques/
heap_overflow_profile_forgeryempty_database_heap_groomingshared_global_auth_abusecross_connection_exec

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub to get started.

$ssh [email protected]