Newsletter 16/10/2023
This machine has a website with an API that is vulnerable to second-order SQLi. Then, there is an authentication mechanism that just requires the password hash, so we can take a hash from the dumped database and log in as an administrator. Then, there is a vulnerability involving PHP and ImageMagick that leads to RCE. Once in the machine, we can pivot to user greg
by analyzing a Git repository and finding plaintext credentials. After that, we are allowed to run a custom binary that hashes a given length of a file and compares the result with a set of pre-computed MD5 hashes. This binary has a capability that allows to read files as root
, which can be used to extract all the contents of any file after automating the process, which allows to read an SSH private key for root
Key written in a binary. Bypassing with GDB
Flask. Server-Side Template Injection. RCE
Node.js. JWT. Prototype Pollution
RSA. Euler totient function
RSA. Quaternions. GCD
Directory Traversal. Symbolic links. File descriptors
64-bit binary. Buffer Overflow. ROP
pickle
. RSA. CBC mode
Shamir Secret Sharing. Lagrange interpolation. Chinese Remainder Theorem. multiprocessing
Padding Oracle Attack. Custom padding. Guessing