Tag : LFI

Stapler – A Second Approach (OSCP Prep)

In the first Stapler walkthrough, we managed a very easy path to a shell by enumerating usernames over SMB and brute-forcing a password with Hydra. From there, some quick digging through the home directories revealed a plain-text password to an account with complete sudo privileges. Root was trivial. In this article, we will take a look at a different route to rooting this box through a "hidden" WordPress blog and a kernel exploit.

Read more

From LFI to Remote Shell (Kioptrix Level 4)

In my previous Kioptrix Level 4 write-up, we went from boot to root on the Kioptrix 4 machine by exploiting password reuse. Along the way, we found a local file inclusion vulnerability that allowed us to gather some valuable information used in owning the box. In this article, we'll take a deeper look at the LFI bug and learn how to use only the LFI to get a reverse shell on the target.

Read more