<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Core-Dump on 0xMesbaha</title>
    <link>https://hussienmisbah.github.io/tags/core-dump/</link>
    <description>Recent content in Core-Dump on 0xMesbaha</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Sat, 26 Mar 2022 00:45:19 +0200</lastBuildDate>
    <atom:link href="https://hussienmisbah.github.io/tags/core-dump/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Secret Hackthebox writeup</title>
      <link>https://hussienmisbah.github.io/posts/linux-machines/2022-03-26-secret/</link>
      <pubDate>Sat, 26 Mar 2022 00:45:19 +0200</pubDate>
      <guid>https://hussienmisbah.github.io/posts/linux-machines/2022-03-26-secret/</guid>
      <description>&lt;p&gt;In this Box we are going to follow documentation instructions to create a new user , will face sensitive data exposure will let us see a delete commit ,this will help us change our token to the admin token and login as admin , reading source codes we find a command injection so we will have a reverse shell as a user, for the root part there is a suid binary that can read any file on the system and count it , and in the source code it has &lt;code&gt;PR_SET_DUMPABLE&lt;/code&gt; so we can dump it if it receives a signal while running ,we will send segmentation fault signal and dump the process then performing strings on the dump we can read the root ssh private key and login as root&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
