Newsletter 08/03/2023
This machine has a website that is vulnerable to password reset poisoning and web cache poisoning. Both vulnerabilities can be used to gain access with a normal account and then get the administrator’s cookie, respectively. After that, we can read a ticket with SSH credentials. Then, we can run a Machine Learning script as root
using sudo
, and there is a library with a vulnerable version where we can inject Python code to escalate privileges
USB HID analysis. Decoding key strokes
Binary operations. Simplify and reverse encryption algorithm