Oct 15, 2022
·
9 min readBypass SSRF filters using domain redirection and abusing Python PDB
Sep 28, 2022
·
12 min readSecret starts with analyzing web source to recover a secret token from older commit. The secret is …
Sep 25, 2022
·
6 min readDriver is also one of the machines listed in the HTB printer exploitation track. It starts with a …
Sep 19, 2022
·
12 min readIntelligence brings some cool enumeration and exploitation techniques to own Active Directory. It …
Nov 22, 2021
·
7 min readBountyHunter features a website that is vulnerable to XXE attack. Exploiting it allows me to …
Nov 07, 2021
·
10 min readSSTI in Nunjucks and SUID capability on Perl
Oct 30, 2021
·
9 min readExploiting ES File Explorer and abusing ADB
Oct 24, 2021
·
9 min readReturn is another machine listed in the HTB printer exploitation track. This machine hosts a web …
Oct 20, 2021
·
10 min readAntique is one of the machines listed in the HTB printer exploitation track. It features a network …
Oct 18, 2021
·
12 min readDynstr imitates a company that offers a Dynamic DNS service. The provided API for this service is …
Oct 14, 2021
·
6 min readCap starts by identifying an IDOR vulnerability on its hosted website. Using this IDOR, I can obtain …
Oct 13, 2021
·
15 min readAs a medium difficulty box, Pit from Hack The Box has an interesting enumeration flow. It starts by …
Sep 24, 2021
·
6 min readSecond-order SQL injection
Sep 16, 2021
·
11 min readMoodle exploitation using CVEs
Sep 12, 2021
·
15 min readSSTI in Golang, abuse S3 bucket, and NGINX backdoor
Aug 28, 2021
·
4 min readExploiting the backdoor planted in PHP 8.1-dev
Aug 09, 2021
·
10 min readBasic things you can do with SSRF
Aug 07, 2021
·
10 min readAbusing JWT key identifier and breaking out of a Docker container
Aug 06, 2021
·
9 min readDeserialization attack on YAML and reversing web assembly
Aug 06, 2021
·
9 min readCode execution with path traversal
Aug 06, 2021
·
5 min readTIL: The staff group allows you to override binaries' executable paths.
Jul 28, 2021
·
9 min readLearn how RID cycling could be used for enumerating AD users
Jul 26, 2021
·
10 min readPwning Drupal 7 CMS with Drupalgeddon and abusing Snap with malicious snap package
Jul 15, 2021
·
9 min readFinding passwords in Group Policy Preferences and roasting Kerberos
Jul 13, 2021
·
4 min readHands on with ShellShock vulnerability
Jul 10, 2021
·
10 min readSupplying a malicious update definition to Electron-updater
Jun 26, 2021
·
10 min readGetting password from automatic login script of ChromeOS
Jun 14, 2021
·
11 min readFriendly PHP insecure deserialization attack and race condition
Jun 14, 2021
·
8 min readExploiting exploitation tools and command injection in a log file
Jun 09, 2021
·
12 min readChaining XSS, SSRF, and deserialization vulnerabilities to get RCE
May 25, 2021
·
9 min readExploiting a logic flaw called TicketTrick
May 15, 2021
·
9 min readTurns SSRF to remote code execution and escape from a Docker container
May 09, 2021
·
9 min readExploiting an insecure deserialization on Jackson library and how to mitigate it
May 08, 2021
·
8 min readSeven times seven is equal to SSTI
May 07, 2021
·
9 min readUSBCreator LPE on Linux
May 06, 2021
·
6 min readUnauthenticated RCE as SYSTEM on Windows 10 IoT
May 04, 2021
·
11 min readAbusing Backup Operators group to dump Active Directory database
May 03, 2021
·
12 min readLearn how Azure Pipelines can be abused
May 01, 2021
·
8 min readTunneling with Chisel to deliver a buffer overflow exploit
Apr 28, 2021
·
10 min readExample of a phishing attack and PyPI package exploitation
Apr 26, 2021
·
7 min readAbusing Tomcat manager-script roles and escalate to root with LXC container
Apr 24, 2021
·
14 min readPentesting against simulated AWS S3 Bucket
Apr 23, 2021
·
11 min readPlundering dead Active Directory accounts
Apr 17, 2021
·
11 min readLFI to RCE on GitLab 12.8.1~12.9.0
Apr 17, 2021
·
17 min readEnumerating network interfaces of a remote computer via MSRPC and exploit NTLMv1
Apr 16, 2021
·
10 min readNest is one of my favorite machines after Forest, I learned a lot about enumeration here, especially …
Apr 09, 2021
·
6 min readSQLi for login bypass and embed webshell to an image file
Apr 07, 2021
·
5 min readLearn basic exploitation of Active Directory
Apr 06, 2021
·
6 min readExploiting embedded system software
Apr 05, 2021
·
6 min readEnumerating public NFS and gain access to sensitive files
Apr 03, 2021
·
7 min readUsing BloodHound to discover abusable Active Directory groups
Apr 02, 2021
·
6 min readExploiting OpenNetAdmin vulnerability and sudo nano