Objective

Gain root access and capture the flag on a vulnerable Linux machine.

Enumeration

The initial reconnaissance phase is critical for understanding the target environment:

Web Enumeration & Analysis

Detailed examination of the web application revealed several security weaknesses:

Exploitation – SQL Injection Vulnerability

The login form was vulnerable to SQL injection attacks, allowing authentication bypass:

File Upload Vulnerability – Remote Code Execution

The admin dashboard contained an insecurely configured file upload feature:

Shell Stabilization & Environment Hardening

After obtaining initial shell access, I took steps to stabilize and improve the shell environment:

Privilege Escalation – Gaining Root Access

The system had a critical misconfiguration that allowed privilege escalation to root:

Capture the Flag – Mission Complete

Successfully located and captured the objective:

Key Security Lessons

← Back to All Articles