<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Rce on 0xMesbaha</title>
    <link>https://hussienmisbah.github.io/tags/rce/</link>
    <description>Recent content in Rce on 0xMesbaha</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Wed, 28 May 2025 12:49:18 +0200</lastBuildDate>
    <atom:link href="https://hussienmisbah.github.io/tags/rce/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>EGCERT-CTF JDBCLeak Exploit</title>
      <link>https://hussienmisbah.github.io/posts/code-review/2025-05-29-jdbcleak-egcert-finals/</link>
      <pubDate>Wed, 28 May 2025 12:49:18 +0200</pubDate>
      <guid>https://hussienmisbah.github.io/posts/code-review/2025-05-29-jdbcleak-egcert-finals/</guid>
      <description>&lt;p&gt;&lt;em&gt;JDBCLeak Leak was a challenge introducted in EGCERT CTF Finals 2025 under the category R&amp;amp;D , tbh i didn&amp;rsquo;t even look at the challenge during CTF Time , didn&amp;rsquo;t expect this category to introduce such good example of a real case code review challenge , however after reading the author&amp;rsquo;s blog &lt;a href=&#34;https://bitthebyte.medium.com/here-is-what-you-missed-during-the-egcert-ctf-2025-finals-927297143d9a&#34; target=&#34;_blank&#34; rel=&#34;noopener noreffer &#34;&gt;here&lt;/a&gt; about the category and challenge i thought of trying it myself and create a POC for it to get rce reading /flag.txt , we got 3rd place btw :&amp;ldquo;D&lt;/em&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Devzat Hackthebox writeup</title>
      <link>https://hussienmisbah.github.io/posts/linux-machines/2022-03-11-devzat/</link>
      <pubDate>Fri, 11 Mar 2022 00:45:12 +0900</pubDate>
      <guid>https://hussienmisbah.github.io/posts/linux-machines/2022-03-11-devzat/</guid>
      <description>&lt;p&gt;In this Hackthebox we will get a user access through a command injection in a vhost , then will make port forwarding to find a service that will give us the password for another user who have access to some backups, in this backups we can find the source-code for a bot , the bot has 2 versions one of them is running locally and it has a command &amp;ldquo;file&amp;rdquo; which allows us to read any file on the sytsem we will make port forwarding one more time to read the root private key and login as root&lt;/p&gt;</description>
    </item>
    <item>
      <title>Previse Hackthebox writeup</title>
      <link>https://hussienmisbah.github.io/posts/linux-machines/2022-01-27-previse/</link>
      <pubDate>Thu, 27 Jan 2022 00:45:08 +0200</pubDate>
      <guid>https://hussienmisbah.github.io/posts/linux-machines/2022-01-27-previse/</guid>
      <description>&lt;p&gt;In this Writeup you will find walkthrough of the retired machine previse From Hackthebox&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
