Exploiting server-side parameter pollution in a query string
Objective
Initial Entry
Scenario
Initial Entry
The scenario here is Huge Logistics, a titan in their industry, has invited you to simulate an “assume breach” scenario. They’re handing you the keys to their kingdom - albeit, the...
Initial Entry point
Initial Entry point
Introduction
Introduction
Introduction
Introduction
Introduction
Introduction
Introduction
Introduction
Introduction
Objective
Objective
Objective
Objective
Objective
Objective
Objective
Objective
Objective
Introduction
Introduction
Objective
Objective
Objective
Objective
Objective
Objective
Objective
Objective
Objective
Objective
Objective
Objective
Objective
Objective
Objective
Objective
Introduction
Introduction
Introduction
Introduction
Introduction
Introduction
Introduction
Introduction
Introduction
Introduction
Introduction
Introduction
Introduction
Introduction
Introduction
Introduction
Introduction
Objective
Objective
Objective
Objective
Objective
Objective
This lab contains a path traversal vulnerability in the display of product images.
This lab contains a path traversal vulnerability in the display of product images.
Objective
Objective
Objective
Objective
Initial Information
Initial Information
Objective
Objective
Objective
In this blog post, we’ll explore some intriguing scenarios where the add extension functionality in a particular subdomain can be exploited to enable a Remote Code Execution vulnerability. The application...
Introduction
Introduction
Introduction
Introduction
Objective
Objective
Objective
Objective
Objective
Introduction
Introduction Gandalf is a prompt injection challenge provided by an AI security company called Lakera where they do engage AI security research activities and alot more.. So this challenge is...
Introduction Easy level CTF lab machine of the HackTheBox platform running Linux containing public exploits, SSRF, RCE. Enumeration Phase Let’s start by enumerating the machines with nmap: sudo nmap -sC...
Introduction
Introduction Easy level HackTheBox platform lab machine running Linux OS, containing a standard password, password transmission using an open communication channel and its untimely change, exploiting a vulnerability in Keepass....
Initial Entry Point
Objective
Objective
Objective
Objective
Initial entry point
Objective
Objective
Objective
Objective
This lab contains a path traversal vulnerability in the display of product images.
This lab contains a path traversal vulnerability in the display of product images.
Objective
Introduction
Introduction
Introduction
Introduction
Initial Information
Initial Information
Objective
Objective
Objective
Objective
Objective
Welcome back to the walkthrough of the Bandit wargame from OverTheWire. If you haven’t checked out Part 1 covering levels 0-13, make sure to do that first. Let’s dive into...
The Bandit wargame on OverTheWire is aimed at absolute beginners and teaches the basics of remote server access and Linux command line skills. This post will walk through the solutions...