KategorilerHack The BoxWalkthroughWeb Security

Traverxec HTB Writeup

I scan the target with nmap tool.

I found the vulnerabiliy at the http service version.

https://www.rapid7.com/db/modules/exploit/multi/http/nostromo_code_exec/

I use the exploit and search the vulnerability that can connect via ssh.

I look nhttpd.conf and there may be instrasting information to use later. I change directory /home/david/public_www

There is a file that extenion is tgz. I copy the zip to unde the tmp directory.

My purpose is that I use authorized_keys to connect ssh.

I copy the content of the authorized_keys. I have to crack the key’s hash.

password=hunter

I connect to ssh

under the /david/bin file, there is a sh file that can be run and I run the sh file and I get the some errors. Below the screenshot is the content of the server-status.sh. I recognize that the sh file can run sudo command without any password.

I run the command an I get the error that I mention above.

After between 1 and 2 hours, I change the shell and command is executed successfully.

KategorilerBurpWeb Security

Burp Suite Education

This page is main that I wrote writeup all Burp Suite questions that I do practice.

PostSwigger is that made burpSuite and It create a practice area for the users and education is free for all people.

I decided to solve all questions in the lab so I will learn most of Web Security topics. I hope 😀

Let’s start.

Server-Side Topics

Client-Side Topics

Advanced topics