Cookie Consent by PrivacyPolicies.com
Posts
Padraignix's InfoSec Blog

HTB Ellingson machine walkthrough. Web enumeration and python console abuse for initial foothold, finding sensitive backup files and hashcat cracking for User pivot, finally into a ROP based overflow exploit for root priviledge escalation.

HTB Writeup machine walkthrough. A relatively easy with an 'out-of-the-box' CMS exploit for User priviledges and an interesting login behavior abuse to pivot to root from there.

A practical buffer overflow case study presentation to our local red team explaining basic concepts and approaches.