• (๑>؂•̀๑)
  • Home
  • Blog
  • Tags
  • Categories
  • Projects
  • Search ﹒◌﹒✦

Search

Linux-Exploitation

Found 20 related articles

Back to Tags
  • 2025-03-08

    Dog - Active Machine Writeup (Content Withheld)


    Content is currently withheld as per HackTheBox policy, since Chemistry is an active machine. This writeup details the full exploitation path from initial access to root, likely involving chemical-themed web application vulnerabilities, service enumeration, and local privilege escalation on a Linux target.

    HackTheBox Active-Machine General-Exploitation Web-Exploitation Linux-Exploitation
  • 2025-03-02

    EscapeTwo - Active Machine Writeup (Content Withheld)


    Content is currently withheld as per HackTheBox policy, since Chemistry is an active machine. This writeup details the full exploitation path from initial access to root, likely involving chemical-themed web application vulnerabilities, service enumeration, and local privilege escalation on a Linux target.

    HackTheBox Active-Machine General-Exploitation Web-Exploitation Linux-Exploitation
  • 2025-02-19

    Titanic - Active Machine Writeup (Content Withheld)


    Content is currently withheld as per HackTheBox policy, since Titanic is an active machine. This writeup details the full exploitation path from initial access to root, likely involving web vulnerabilities, service enumeration, and local privilege escalation.

    HackTheBox Active-Machine General-Exploitation Linux-Exploitation
  • 2025-02-19

    Instant - APK Decompilation, LFI via Swagger API, and Solar-PuTTY Backup Decryption


    Technical writeup detailing the compromise of the Instant machine. Initial foothold is achieved through static analysis of a downloadable APK file, revealing subdomains and a hardcoded API key. This key is used to exploit a Local File Inclusion (LFI) vulnerability within the authenticated Swagger API (via the logs reading function), leading to SSH key exfiltration and user access. Privilege escalation is achieved by locating, transferring, and decrypting an encrypted Solar-PuTTY sessions backup file, which yields the root password.

    HackTheBox APK-Analysis Decompilation Swagger-UI API-Key-Disclosure LFI Local-File-Inclusion SSH-Key-Exfiltration Solar-PuTTY-Decryption Password-Cracking Linux-Exploitation
  • 2024-12-05

    TheStickerShop - Stored XSS Leading to Data Exfiltration


    Technical writeup detailing the compromise of TheStickerShop. The primary vulnerability exploited is a Stored Cross-Site Scripting (XSS) vulnerability found in the 'Feedback' form on the Python/Werkzeug web server (8080/tcp). The attack leverages a custom JavaScript payload to bypass a 401 Unauthorized error, fetch the restricted 'flag.txt' file, encode its content in Base64, and exfiltrate the data to an attacker-controlled HTTP server via an Image object request.

    TryHackMe XSS Stored-XSS Data-Exfiltration JavaScript-Exploitation Web-Vulnerability HTTP-Server-Exploitation Linux-Exploitation
  • 2024-12-04

    Vaccine - FTP, PKZIP/MD5 Cracking, SQL Injection via SQLMap, and SUID vi Privesc


    Technical writeup detailing the compromise of the Vaccine machine. Initial access is achieved by exploiting Anonymous FTP to retrieve a password-protected PKZIP file, cracking the PKZIP and subsequent MD5 hashes to gain web credentials. Authentication leads to exploiting a blind SQL Injection vulnerability via SQLMap, gaining an OS shell. Privilege escalation is completed by finding plaintext credentials for SSH access, then exploiting the SUID binary 'vi' with specific permissions via the ':shell' command to achieve a root shell.

    HackTheBox FTP PKZIP-Cracking MD5-Cracking Hashcat SQL-Injection SQLmap PostgreSQL Reverse-Shell SUID-Privilege-Escalation vi-Exploitation Linux-Exploitation
  • 2024-12-02

    Oopsie - IDOR, Arbitrary File Upload, and SUID Path Hijacking


    Technical writeup detailing the compromise of the Oopsie machine. Initial access involves exploiting an IDOR vulnerability to enumerate credentials, followed by cookie manipulation to gain access to an arbitrary file upload function for a PHP reverse shell. Privilege escalation is achieved by finding plaintext database credentials for SSH access, and finally, exploiting the SUID binary '/usr/bin/bugtracker' using a PATH hijacking technique to execute a root shell.

    HackTheBox Web-Exploitation IDOR Insecure-Direct-Object-Reference Cookie-Manipulation Arbitrary-File-Upload Reverse-Shell SUID-Privilege-Escalation Path-Hijacking PHP Linux-Exploitation
  • 2024-11-27

    Alert - XSS to LFI, Hash Cracking, and Group Write Privilege Escalation


    Technical writeup detailing the compromise of the Alert Linux machine. Initial access is gained by chaining a Stored XSS vulnerability in the Markdown viewer to a Local File Inclusion (LFI) vulnerability in an internal /messages endpoint. LFI is used to exfiltrate an Apache MD5 hash from the .htpasswd file, which is then cracked via Hashcat to obtain SSH credentials for the 'albert' user. Privilege escalation is achieved by identifying a high-privileged PHP process running as root in a directory with group write permissions (management), which the 'albert' user belongs to. The configuration.php file is modified to set the SUID bit on /bin/bash, granting a root shell.

    HackTheBox XSS LFI Local-File-Inclusion Cross-Site-Scripting Hashcat Apache-MD5-Crack SSH-Port-Forwarding PHP-Privilege-Escalation SUID-Exploitation Linux-Exploitation
  • 2024-11-21

    Three - S3 Bucket Misconfiguration and Remote Code Execution via AWS CLI


    Technical writeup detailing the compromise of the Three machine. The methodology involves identifying an exposed subdomain (s3.thetoppers.htb) pointing to an AWS S3 bucket. Exploitation is achieved by leveraging a misconfigured access policy via the AWS CLI to perform an arbitrary file upload of a PHP webshell. Remote Code Execution (RCE) is then established using the webshell, leading to full system access as the www-data user.

    HackTheBox AWS S3-Bucket-Exploitation AWS-CLI Arbitrary-File-Upload Reverse-Shell PHP-Webshell Subdomain-Enumeration Linux-Exploitation
  • 2024-11-20

    Crocodile - FTP Anonymous Login and Credential Disclosure


    Technical writeup detailing the compromise of the Crocodile machine. Initial access is achieved by exploiting the Anonymous FTP login vulnerability on the vsFTPd 3.0.3 service (21/tcp) to disclose files containing credentials (allowed.userlist and allowed.userlist.passwd). Web enumeration via Gobuster reveals a hidden '/login.php' endpoint. The disclosed 'admin' credentials are used to access the web panel and retrieve the flag, completing the box.

    HackTheBox FTP FTP-Anonymous vsFTPd Credential-Disclosure Information-Disclosure Web-Enumeration Gobuster Linux-Exploitation
  • 2024-11-19

    Sequel - Exploiting Unauthenticated MariaDB Access (A07:2021)


    Technical writeup detailing the compromise of the Sequel machine. The methodology focuses on Nmap scanning to identify the exposed MariaDB service (version 10.3) on port 3306. The system is exploited due to a critical Identification and Authentication Failure (OWASP A07:2021) allowing unauthenticated root login. The process concludes with database enumeration (SHOW DATABASES, USE htb, SELECT * FROM config) to retrieve the flag.

    HackTheBox MariaDB MySQL Port-3306 Unauthenticated-Access OWASP-A07 Database-Enumeration Linux-Exploitation
  • 2024-11-06

    Whiterose - IDOR, EJS SSTI (CVE-2022-29078), and Sudoedit Bypass (CVE-2023-22809)


    Technical writeup detailing the compromise of the Whiterose machine. Initial access involves subdomain enumeration via wFuzz and exploiting an IDOR vulnerability to retrieve privileged user credentials. This leads to a Server-Side Template Injection (SSTI) RCE via CVE-2022-29078 (EJS Template Engine vulnerability). Privilege escalation is achieved by exploiting the Sudoedit vulnerability CVE-2023-22809 to gain root access via modifying the /etc/sudoers file.

    TryHackMe IDOR wFuzz BurpSuite SSTI CVE-2022-29078 EJS-Template Reverse-Shell Sudoedit-Bypass CVE-2023-22809 Linux-Exploitation
  • 2024-10-21

    Chemistry - Pymatgen RCE (CVE-2024-23346), SSH Port Forwarding, and aiohttp LFI (CVE-2024-23334)


    Technical writeup detailing the compromise of the Chemistry machine. Initial access (RCE) is gained by exploiting CVE-2024-23346, an arbitrary code execution vulnerability in the pymatgen library via a malicious .CIF file upload, leading to a low-privileged shell. Privilege escalation is achieved by locating hidden credentials in a SQLite database, gaining SSH access, and then using SSH Port Forwarding to access an internal web service. The final step involves exploiting CVE-2024-23334, a critical path traversal vulnerability in aiohttp/3.9.1, to perform Local File Inclusion (LFI) and read the /etc/shadow file for root access.

    HackTheBox RCE CVE-2024-23346 Pymatgen CIF-File-Exploit Reverse-Shell SSH-Port-Forwarding LFI CVE-2024-23334 aiohttp Local-File-Inclusion Linux-Exploitation
  • 2024-10-20

    TwoMillion - API Enumeration, Information Disclosure, and Kernel Privilege Escalation (CVE-2023-0386)


    Technical writeup detailing the compromise of the TwoMillion machine. Initial access involves decoding ROT13-encrypted data from JavaScript to find an API endpoint, followed by manipulating API parameters to gain administrator privileges via Insecure Direct Object Reference (IDOR), leading to a reverse shell injection. Local Privilege Escalation is achieved by disclosing plaintext credentials from a '.env' file for SSH access, and finally, exploiting the unpatched Linux Kernel vulnerability, CVE-2023-0386 (OverlayFS/FUSE), to gain root privileges.

    HackTheBox API-Exploitation Information-Disclosure BurpSuite ROT13 LFI ENV-File-Disclosure CVE-Exploitation Kernel-Privesc OverlayFS Linux-Exploitation
  • 2024-10-15

    Source - Webmin 1.890 RCE (CVE-2019-15107) Exploitation


    Technical writeup detailing the immediate compromise of the Source machine by exploiting the Webmin service running on port 10000. The vulnerability leveraged is the unauthenticated Remote Code Execution (RCE) backdoor in Webmin versions 1.882 < 1.921 (CVE-2019-15107). Exploitation is achieved by running a public exploit to gain direct root access and establishing a reverse shell for full system control.

    TryHackMe Webmin Port-10000 CVE-2019-15107 RCE Reverse-Shell Backdoor Root-Access Linux-Exploitation
  • 2024-10-11

    TickTackRoot - FTP Anonymous, SSH Brute-Force, and SUID Binary Exploitation


    Technical writeup detailing the compromise of the TickTackRoot machine. The path includes initial enumeration of open services (21/FTP, 22/SSH, 80/HTTP). Access is gained by leveraging Anonymous FTP login to find potential usernames, followed by a successful SSH brute-force attack using Hydra. Privilege escalation is achieved by exploiting the SUID binary 'timeout_suid' to gain a root shell, demonstrating a classic Linux privilege escalation technique.

    TheHackersLabs Linux-Exploitation FTP-Anonymous SSH-BruteForce Hydra SUID-Privilege-Escalation timeout-Exploit
  • 2024-10-01

    WalkingCMS - WordPress Exploitation via Theme Editor and SUID Privilege Escalation


    Technical writeup detailing the compromise of the WalkingCMS challenge. Initial access involves enumerating a WordPress installation via Gobuster, credential cracking using WPScan, and achieving a reverse shell by modifying the theme's index.php file. Final root access is achieved by exploiting a vulnerable SUID binary, '/usr/bin/env', using standard Linux privilege escalation techniques.

    DockerLabs WordPress WPScan Brute-Force Reverse-Shell SUID-Privilege-Escalation Linux-Exploitation Gobuster
  • 2024-09-18

    Injection - SQLi Authentication Bypass and SUID Privilege Escalation


    Technical writeup covering the compromise of the 'Injection' challenge. Methodology includes port scanning, exploitation of a SQL Injection vulnerability for authentication bypass (' OR 1=1-- -), securing initial access via SSH, and leveraging a vulnerable SUID binary ('env') via GTFObins for root privilege escalation.

    DockerLabs SQL-Injection Auth-Bypass SUID-Privilege-Escalation Linux-Exploitation GTFObins SSH
  • 2024-09-17

    Trust - SSH Brute-Force and Vim Sudo Privilege Escalation


    Technical writeup detailing the compromise of the 'Trust' challenge. Methodology includes Nmap scanning and web fuzzing via Gobuster to identify hidden resources, a targeted Hydra brute-force attack to obtain SSH credentials, and final privilege escalation by exploiting the NOPASSWD sudo permission on the Vim binary.

    DockerLabs Brute-Force Hydra SSH Web-Fuzzing Gobuster Sudo-Privilege-Escalation Linux-Exploitation
  • 2024-09-03

    Meow - Exploiting Weak Credentials via Telnet (Port 23)


    Technical writeup detailing the compromise of the Meow machine. The methodology involves Nmap scanning to identify the exposed Telnet service on port 23 and exploiting weak, unauthenticated credentials (root access with no password) to gain immediate root control and retrieve the flag.

    HackTheBox Telnet Weak-Credentials Port-23 Remote-Access Linux-Exploitation