• (๑>؂•̀๑)
  • Home
  • Blog
  • Tags
  • Categories
  • Projects
  • Search ﹒◌﹒✦

Search

Linux

Found 3 related articles

Back to Tags
  • 2025-03-03

    Internship - Multi-Stage Exploitation via SQLi and Steganography


    Technical writeup covering multi-stage compromise of the 'Internship' challenge. The methodology progresses from SQL Injection authentication bypass and user data extraction to a targeted SSH brute-force attack (Hydra). Privilege escalation involves script modification for horizontal movement, culminating in steganography analysis (Steghide) for final root access.

    DockerLabs SQL-Injection Authentication-Bypass Hydra SSH-Brute-Force Privilege-Escalation Steganography Steghide Linux
  • 2024-10-16

    EvilCUPS - CUPS Vulnerability Chaining (CVEs) and Local Credential Compromise


    Technical writeup detailing the compromise of the EvilCUPS machine. Initial access is achieved by exploiting a chain of CUPS vulnerabilities (including CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, CVE-2024-47177) to gain Remote Code Execution (RCE) as the 'lp' user. Local privilege escalation is then performed by manually enumerating the CUPS spool directory (/var/spool/cups) to extract cleartext credentials for the root user.

    HackTheBox CUPS CVE-Exploitation Vulnerability-Chaining RCE IPP Local-Privesc Linux
  • 2024-10-09

    BreakMySSH - Exploiting OpenSSH CVE-2018-15473 for Root Access


    Technical writeup detailing the compromise of the BreakMySSH challenge. Methodology covers Nmap scanning, exploiting the OpenSSH 7.7 Username Enumeration vulnerability (CVE-2018-15473) to identify a valid user, followed by a targeted password brute-force attack using Hydra to gain root access.

    DockerLabs SSH Linux CVE-Exploitation Username-Enumeration Hydra Brute-Force Weak-Credentials