Analytify (Bug): cURL error 77: error setting certificate verify locations: CAfile: /etc/nginx/ssl/cacert.pem CApath: /etc/ssl/certs (see for OSCPPrep Archives - Page 2 of 2 -

Tag : OSCPPrep

Stapler – A Second Approach (OSCP Prep)

In the first Stapler walkthrough, we managed a very easy path to a shell by enumerating usernames over SMB and brute-forcing a password with Hydra. From there, some quick digging through the home directories revealed a plain-text password to an account with complete sudo privileges. Root was trivial. In this article, we will take a look at a different route to rooting this box through a "hidden" WordPress blog and a kernel exploit.

Read more

FristiLeaks Walkthrough (OSCP Prep)

Fristileaks is a fairly straightforward CTF-like machine that is considered a good practice box while preparing for the OSCP. The goal is to get root and read the flag file, and the focus is on enumeration.< We will need to read the source for clues, bypass a file upload filter, and even a little guesswork along the way. This write-up will walk through the Fristileaks box from boot to root.

Read more

From LFI to Remote Shell (Kioptrix Level 4)

In my previous Kioptrix Level 4 write-up, we went from boot to root on the Kioptrix 4 machine by exploiting password reuse. Along the way, we found a local file inclusion vulnerability that allowed us to gather some valuable information used in owning the box. In this article, we'll take a deeper look at the LFI bug and learn how to use only the LFI to get a reverse shell on the target.

Read more