• (๑>؂•̀๑)
  • Home
  • Blog
  • Tags
  • Categories
  • Projects
  • Search ﹒◌﹒✦

Search

SSH

Found 4 related articles

Back to Tags
  • 2025-03-11

    ApiBase - API Endpoint Enumeration and Privilege Escalation


    Technical writeup detailing the compromise of a DockerLabs API-based system. Methodology includes Nmap scanning, API endpoint enumeration (GET/POST methods), credential brute-forcing via Caido, file transfer (SCP), and PCAP network analysis using Wireshark to extract critical credentials for root access.

    DockerLabs API-Testing Endpoint-Enumeration Brute-Force Wireshark PCAP-Analysis SSH Privilege-Escalation
  • 2024-10-09

    BreakMySSH - Exploiting OpenSSH CVE-2018-15473 for Root Access


    Technical writeup detailing the compromise of the BreakMySSH challenge. Methodology covers Nmap scanning, exploiting the OpenSSH 7.7 Username Enumeration vulnerability (CVE-2018-15473) to identify a valid user, followed by a targeted password brute-force attack using Hydra to gain root access.

    DockerLabs SSH Linux CVE-Exploitation Username-Enumeration Hydra Brute-Force Weak-Credentials
  • 2024-09-18

    Injection - SQLi Authentication Bypass and SUID Privilege Escalation


    Technical writeup covering the compromise of the 'Injection' challenge. Methodology includes port scanning, exploitation of a SQL Injection vulnerability for authentication bypass (' OR 1=1-- -), securing initial access via SSH, and leveraging a vulnerable SUID binary ('env') via GTFObins for root privilege escalation.

    DockerLabs SQL-Injection Auth-Bypass SUID-Privilege-Escalation Linux-Exploitation GTFObins SSH
  • 2024-09-17

    Trust - SSH Brute-Force and Vim Sudo Privilege Escalation


    Technical writeup detailing the compromise of the 'Trust' challenge. Methodology includes Nmap scanning and web fuzzing via Gobuster to identify hidden resources, a targeted Hydra brute-force attack to obtain SSH credentials, and final privilege escalation by exploiting the NOPASSWD sudo permission on the Vim binary.

    DockerLabs Brute-Force Hydra SSH Web-Fuzzing Gobuster Sudo-Privilege-Escalation Linux-Exploitation