#hacking
Read more stories on Hashnode
Articles with this tag
Use ssh-keygen to create a set of secure RSA keys, public and private, on your own machine Note the location of the private key Copy the public key...
We found a vulnerable web server and uploaded a PHP reverse shell, and activated it. We end up as the user www-data. To privilege escalate, we use...
Server-Side Filtering: File Extensions Go to annex.uploadvulns.thm Try to upload the reverse shell script with various file extensions. .png...
Go to overwrite.vulns.thm Look at the source code Find an image file ~> mountains.jpg Rename file to be uploaded to "mountains.jpg" Upload file, get...
Navigate to the IP address of the box in the browser Go to /robots.txt to find pages the owner doesn't want crawled Find key-1-of-3.txt for the first...