HTB: Exlore

Posted on 01 Nov 2021 in security • Tagged with security, boot2root, HTB, Android, exploit, adb • 3 min read

Explore card

This is a writeup about a retired HacktheBox machine: Explorer created by bertolis and publish on June 26, 2021. This box is classified as an easy machine. The user part involves an Android exploit for ES File Explorer and the root part a simple port forward and an adb shell.


Continue reading

HTB: ServMon

Posted on 21 Jun 2020 in security • Tagged with security, boot2root, HTB, Windows, exploit • 7 min read

ServMon Card

This article is a writeup about a retired HacktheBox machine: ServMon publish on April 11 2020 by dmw0ng. This box is rated as an easy box. This box is really unstable and can be a pain as there is a lot of reset on public server. It implies an anonymous FTP, a Passwords.txt file and two exploits.


Continue reading

HTB: Writeup

Posted on 12 Oct 2019 in security • Tagged with security, boot2root, HTB, exploit, linux • 4 min read

Writeup Card

This article is a writeup about a retired HacktheBox machine: Writeup. (Yes the machine name is writeup, searching a writeup for writeup will be a funny thing.). The machine is classed as an easy one. It involves vulnerability in a known CMS as well as "PATH vulnerability" for the privilege escalation.


Continue reading

CVE 2016-5195 dirtycow

Posted on 11 Dec 2016 in security • Tagged with cve, security, exploit • 2 min read

Ðirtycow logo

Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the Linux Kernel. "A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system." (Source: Red Hat)


Continue reading

CVE 2016-6210 OpenSSHD user enumeration

Posted on 23 Jul 2016 in security • Tagged with cve, security, exploit • 2 min read

The 13th if July a new wild CVE appeared (Yes, Pokemon Go is still a buzz for the moment).

The CVE 2016-6210 allow a user enumeration on an SSH server by comparing request time between non existing user and allowed ones. This vulnerability target OpenSSHD with a version of 7.2p2 or inferior.

That means with a good dictionary you may know which user are present on the server with an SSH access.

This post just demonstrate how to exploit this vulnerability with a simple example.


Continue reading