
Hack The Box - Nocturnal
An easy-difficulty Linux machine exploiting IDOR vulnerabilities and command injection to dump database credentials, followed by SSH tunneling and ISPConfig exploitation for root access.

An easy-difficulty Linux machine exploiting IDOR vulnerabilities and command injection to dump database credentials, followed by SSH tunneling and ISPConfig exploitation for root access.

A writeup of the Dog machine from Hack The Box, featuring web enumeration, git repository exploitation, CMS vulnerability, and privilege escalation through a misconfigured binary.