Writeup – HackTheBox writeup
Exploitation Summary Initial Exploitation Vulnerability: SQL Injection vulnerability of CMS Made EasyExplanation: CMS Made Easy version 2.2.9.1 has a SQL Injection vulnerability that results in exposure to login id and…
Exploitation Summary Initial Exploitation Vulnerability: SQL Injection vulnerability of CMS Made EasyExplanation: CMS Made Easy version 2.2.9.1 has a SQL Injection vulnerability that results in exposure to login id and…
There are different ways to transfer installation files or VMs over to ESXi server. You can do it over the network or you can do it using USB. Although ESXi…
CDK stands for Cloud Development Kit. It defines cloud infrastructure in code and provisions resources through AWS CloudFormation. This post will demonstrate how to setup and execute a simple CDK…
Exploitation Summary Initial Exploitation Vulnerability: Backdoor Command Execution of UnrealIRCDExplanation: A malicious backdoor was added to UnrealIRCD version 3.2.8.1 Privilege Escalation Vulnerability: suid executable viewuserExplanation: It can execute as root…
Gatsby is a free and open source framework based on React that helps developers build blazing fast websites and apps. It achieves high performance by generating static files for your React application. This…
AWS Route 53 is a highly available DNS service offered by Amazon. It also serves as domain registrar where you can register and manage your domain registration. It's competitive and…
Target IP: 10.10.10.140 Exploitation Summary Initial Exploitation Vulnerability: Remote code execution via MagentoExplanation: Magento has couple remote code execution vulnerabilities allowing admin account creation and then code execution through admin…
We discussed how to view PDF files more safely a while back. Most of the time we only need to read PDF files. But once in a while, we want…
Fact: Simply opening an infected PDF file can get your device compromised. Need: to open PDF files more safely. PDF probably is the most commonly used format to facilitate exchange of…
VM: Jarbas 1Goal: Obtain root shellApproach: solve without automated exploitation tools Target Discovery nmap -sn 192.168.172.200-254 Our target: 192.168.172.238 Port Scanning nmap -p- -A 192.168.172.238 Port 22: OpenSSH 7.4Port 80:…