pentestProhard
Лотерея (Lottery)
hackerlab
Task: PHP/MariaDB lottery app with PHPSESSID cookie used directly in raw SQL query, admin panel with shell_exec command injection, SSH with leaked credentials, and sudo pip privesc. Solution: error-based SQLi via cookie to extract admin password, command injection via dateFormat parameter, SSH credential recovery from auth.log, then GTFOBins sudo pip to read root flag.
$ ls tags/ techniques/
command_injectionsql_injectionphpcredential_leakapachesshgtfobinsprivilege_escalationshell_execcookie_injectionmariadbdate_commanderror_based_sqlichained_attackphpsessidauth_logsudo_pip
error_based_sqli_via_cookieextractvalue_sqlicommand_injection_via_shell_execssh_credential_extraction_from_auth_logsudo_pip_privesc
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Lucky Ticket (Счастливый билет)— hackerlab
- [web][Pro]Pryzhok— hackerlab
- [infra][Pro]Секретный кабинет (Secret Cabinet)— hackerlab
- [web][Pro]Привилегированный гость (Privileged Guest)— hackerlab
- [web][Pro]Раздача купонов (Coupon Giveaway)— duckerz