Skip to main content

#intermediate

13 posts tagged with "intermediate"

Back to all tags
🧠Educationalintermediate· 13 min read

OverTheWire Bandit Level 20: Understanding setuid Binaries and Privilege Escalation

OverTheWire Bandit Level 20 walkthrough. Learn about setuid binaries, how they work, and how to use them for privilege escalation. Essential concept for Linux security.

OverTheWireBanditLinuxprivilege escalation+3
Read β†’
🧠Educationalintermediate· 13 min read

OverTheWire Bandit Level 21: Network Programming and Localhost Connections

OverTheWire Bandit Level 21 walkthrough. Learn about network programming, localhost connections, using netcat as a listener, and how setuid binaries can interact with network services.

OverTheWireBanditLinuxnetcat+4
Read β†’
🧠Educationalintermediate· 13 min read

OverTheWire Bandit Level 22: Understanding Cron Jobs and Scheduled Tasks

OverTheWire Bandit Level 22 walkthrough. Learn about cron jobs, scheduled tasks, reading cron configurations, and how automated processes can be exploited for privilege escalation.

OverTheWireBanditLinuxcron+4
Read β†’
🧠Educationalintermediate· 14 min read

OverTheWire Bandit Level 23: Exploiting Cron Jobs with Variable Substitution

OverTheWire Bandit Level 23 walkthrough. Learn about cron job exploitation, variable substitution, MD5 hashing, and how to analyze and manipulate shell scripts for privilege escalation.

OverTheWireBanditLinuxcron+5
Read β†’
🧠Educationalintermediate· 13 min read

OverTheWire Bandit Level 24: Creating Your First Exploit Script

OverTheWire Bandit Level 24 walkthrough. Learn to create your first shell script exploit, understand cron job execution, file permissions, and how to get automated processes to run your code.

OverTheWireBanditLinuxcron+4
Read β†’
🧠Educationalintermediate· 13 min read

OverTheWire Bandit Level 25: Introduction to Brute-Forcing and Network Services

OverTheWire Bandit Level 25 walkthrough. Learn about brute-forcing, network service exploitation, looping in bash, and how to automate password attacks against network services.

OverTheWireBanditLinuxbrute-force+5
Read β†’
🧠Educationalintermediate· 9 min read

OverTheWire Bandit Level 27: Using Your Escaped Shell and setuid Binaries

OverTheWire Bandit Level 27 walkthrough. Learn to use your escaped shell from Level 26, work with setuid binaries, and continue building on shell escape techniques.

OverTheWireBanditLinuxsetuid+3
Read β†’
🧠Educationalintermediate· 12 min read

OverTheWire Bandit Level 29: Finding Secrets in Git History

OverTheWire Bandit Level 29 walkthrough. Learn about Git commit history, viewing changes in commits, and how secrets in old commits can still be accessed even after being removed.

OverTheWireBanditLinuxGit+5
Read β†’
🧠Educationalintermediate· 12 min read

OverTheWire Bandit Level 30: Finding Secrets in Git Branches

OverTheWire Bandit Level 30 walkthrough. Learn about Git branches, checking out branches, and how secrets might be stored in non-production branches even when removed from the main branch.

OverTheWireBanditLinuxGit+5
Read β†’
🧠Educationalintermediate· 13 min read

OverTheWire Bandit Level 31: Finding Secrets in Git Refs and Packed-Refs

OverTheWire Bandit Level 31 walkthrough. Learn about Git refs, packed-refs files, and how Git stores references to commits that might contain secrets not visible in normal git log output.

OverTheWireBanditLinuxGit+5
Read β†’
🧠Educationalintermediate· 13 min read

OverTheWire Bandit Level 32: Git Push Operations and Bypassing .gitignore

OverTheWire Bandit Level 32 walkthrough. Learn about Git push operations, .gitignore files, and how to bypass .gitignore restrictions to push files to a remote repository.

OverTheWireBanditLinuxGit+6
Read β†’
🧠Educationalintermediate· 11 min read

OverTheWire Bandit Level 33: Escaping Uppercase Shell Using Positional Parameters

OverTheWire Bandit Level 33 walkthrough. Learn about positional parameters, escaping restricted shells, and using $0 to bypass uppercase shell restrictions.

OverTheWireBanditLinuxshell escape+5
Read β†’
🧠Educationalintermediate· 4 min read

HTB: Active Directory Lab (Intermediate)

An intermediate walkthrough covering Active Directory enumeration, Kerberoasting, and domain privilege escalation techniques.

Hack The BoxCTFActive DirectoryKerberos+1
Read β†’

Related Tags