• (๑>؂•̀๑)
  • Home
  • Blog
  • Tags
  • Categories
  • Projects
  • Search ﹒◌﹒✦

Search

Brute-Force

Found 5 related articles

Back to Tags
  • 2025-03-11

    ApiBase - API Endpoint Enumeration and Privilege Escalation


    Technical writeup detailing the compromise of a DockerLabs API-based system. Methodology includes Nmap scanning, API endpoint enumeration (GET/POST methods), credential brute-forcing via Caido, file transfer (SCP), and PCAP network analysis using Wireshark to extract critical credentials for root access.

    DockerLabs API-Testing Endpoint-Enumeration Brute-Force Wireshark PCAP-Analysis SSH Privilege-Escalation
  • 2024-10-31

    StellarJWT - JWT Exploitation and Chained SUID Privilege Escalation


    Technical writeup detailing the compromise of the 'StellarJWT' challenge. The methodology involves identifying and decoding an exposed JSON Web Token (JWT) for user enumeration, followed by a dictionary attack using Hydra for SSH access. Privilege escalation is achieved through a chained exploitation of NOPASSWD SUID binaries: using 'socat' for horizontal movement and 'chown' for '/etc/passwd' modification to gain final root access.

    DockerLabs JWT-Exploitation Brute-Force Hydra SUID-Privilege-Escalation NOPASSWD-sudo socat chown-bypass
  • 2024-10-09

    BreakMySSH - Exploiting OpenSSH CVE-2018-15473 for Root Access


    Technical writeup detailing the compromise of the BreakMySSH challenge. Methodology covers Nmap scanning, exploiting the OpenSSH 7.7 Username Enumeration vulnerability (CVE-2018-15473) to identify a valid user, followed by a targeted password brute-force attack using Hydra to gain root access.

    DockerLabs SSH Linux CVE-Exploitation Username-Enumeration Hydra Brute-Force Weak-Credentials
  • 2024-10-01

    WalkingCMS - WordPress Exploitation via Theme Editor and SUID Privilege Escalation


    Technical writeup detailing the compromise of the WalkingCMS challenge. Initial access involves enumerating a WordPress installation via Gobuster, credential cracking using WPScan, and achieving a reverse shell by modifying the theme's index.php file. Final root access is achieved by exploiting a vulnerable SUID binary, '/usr/bin/env', using standard Linux privilege escalation techniques.

    DockerLabs WordPress WPScan Brute-Force Reverse-Shell SUID-Privilege-Escalation Linux-Exploitation Gobuster
  • 2024-09-17

    Trust - SSH Brute-Force and Vim Sudo Privilege Escalation


    Technical writeup detailing the compromise of the 'Trust' challenge. Methodology includes Nmap scanning and web fuzzing via Gobuster to identify hidden resources, a targeted Hydra brute-force attack to obtain SSH credentials, and final privilege escalation by exploiting the NOPASSWD sudo permission on the Vim binary.

    DockerLabs Brute-Force Hydra SSH Web-Fuzzing Gobuster Sudo-Privilege-Escalation Linux-Exploitation