rootšŸ’€senseicat:~#

Hack. Eat. Sleep. Repeat!!!


Project maintained by SENSEiXENUS Hosted on GitHub Pages — Theme by mattgraham

TRYHACKME

Lab: Debug


image


Recon

image

image


CODE REVIEW OF index.php

Main vulnerability: Insecure Deserialization in function unserialze()

Deserialization covers conversion of an object into bytes.Serialization converts bytes into an object.These concepts are carried out by some programming languages’ functions and if not properly handled might lead to remote code execution or other critical vulnerabilities. Some examples of dangerous unserializing functions in python and php are pickle.dumps()[python],yaml.loads()[python],unserialize()[php].


Exploit

image


Initial Foothold

image

image

image

image


PRIVESC with /etc/update-motd.d files

image

image

image


THANKS FOR READING!!!!!!!!


REFERENCES: