All Posts

  • Published on
    The application has the following vulnerabilities: endpoint enumeration via FUZZ, SQL Injection, remote command execution (RCE), and privilege escalation via Linux capabilities.
  • Published on
    This is a HackingClub championship machine where we found an IDOR that provides initial access and Privilege Escalation through XAMPP.
  • Published on
    The Poisoning machine has an LFI vulnerability exploited with Log Poisoning for RCE execution, followed by privilege escalation using Python with cap_setuid+ep capability for root.