Socket is a Medium Difficulty Linux machine that requires reversing a Linux/Windows desktop application. This reveals an endpoint that is vulnerable to `SQL` injection via a websocket. Dumping the database leaks hashes that, once cracked, yield `SSH` access to the box. Finally, a `PyInstaller` script can be executed with elevated privileges that grant root access to the machine.
Actively writing about technology, life-events and indie hacking. Here are some of my most recent thoughts and hacks I've published.
Inject is an easily level Linux challenge on Hack the box. It exposes a website that is vulnerable to LFI. Which can be used to expose the Java source code and dependency file. Using Snyk shows a vulnerable dependency that allows remote code execution.. The root step is about abusing a cron that’s running the Ansible automation framework.
This is a write-up of Soccer, a CTF challenge on the Hack the Box platform. It's an easy-level Linux machine where good enumeration is key. A misconfigured file manager grants access to the box. This reveals a hidden side with a SQL vulnerability that allows to pivot to a more privileged user. With doas configured for this user, I then craft an exploit to get access to root.
In this post, I walk you through how to configure the AWS CLI to proxy all its requests through Burp Suite. It's an exciting way to learn how the CLI works internally or could be helpful when debugging a weird edge case.
Nowadays, it is relatively common to find a stripped-down docker container. While great to save precious bytes on hard drives, this might complicate things when you quickly need to debug something. This post explains how you can quickly install dig or nslookup within your container on different distros.
In this post I show how you can use router api to detect active link in Next.js
In this post, I'll go over Cap from Hack the Box. An easy level Linux machine where the name is nice hint. An IDOR gives access to a PCAP with unencrypted traffic and misconfigured capabilites allow getting a shell as root.
Being able to experiment with vulnerabilities is crucial to gain a deeper understanding of them. In this post, we'll look at creating an environment with a vulnerable version of the OMI agent.
In this post, I'll go over Knife from Hack the Box. It's an easy level Linux machine that shows what damage a supply chain attack on the PHP codebase could have caused if it would have slipped through the cracks and got released into the wild.