HackTheBoxMedium
2024-12-01
Machine Name Writeup
A detailed walkthrough of exploiting a vulnerable web application and escalating privileges through misconfigured SUID binaries.
#Web#Privilege Escalation#Linux
READ WRITEUP
Detailed solutions and methodologies from Capture The Flag competitions. Learn offensive security techniques through practical examples.
A detailed walkthrough of exploiting a vulnerable web application and escalating privileges through misconfigured SUID binaries.
Step-by-step guide covering network enumeration, service exploitation, and post-exploitation techniques.
Breaking a custom RSA implementation with a small public exponent vulnerability using Coppersmith's attack.
Exploiting a blind SQL injection vulnerability to extract sensitive data and bypass authentication.
Comprehensive guide to attacking Active Directory environments including Kerberoasting and Pass-the-Hash.