pentestProhard

Лотерея (Lottery)

hackerlab

Task: PHP/MariaDB lottery app with PHPSESSID cookie used directly in raw SQL query, admin panel with shell_exec command injection, SSH with leaked credentials, and sudo pip privesc. Solution: error-based SQLi via cookie to extract admin password, command injection via dateFormat parameter, SSH credential recovery from auth.log, then GTFOBins sudo pip to read root flag.

$ ls tags/ techniques/
error_based_sqli_via_cookieextractvalue_sqlicommand_injection_via_shell_execssh_credential_extraction_from_auth_logsudo_pip_privesc

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups