March 31, 2023, 12:39 p.m. | Mr Jokar

System Weakness - Medium systemweakness.com

“Inception” WriteUp | HackThebox | Learn Pivoting with Proxychains

Summary : This machine requires a known software’s LFI exploit that leads to clear text credential to webdav exploit. Then we get a webshell and from leveraging the web proxy we SSH into a machine. But then some more pivoting is required to get into the real machine and get root.

Initial Enumeration

First I will run a port scan with threader3000 a multi threaded port scanner made by the mayor. …

apt chisel cybersecurity hackthebox pivot proxychains writeup

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)