<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>RCE on 0xMesbaha</title>
    <link>https://hussienmisbah.github.io/tags/rce/</link>
    <description>Recent content in RCE on 0xMesbaha</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 12:49:18 +0200</lastBuildDate>
    <atom:link href="https://hussienmisbah.github.io/tags/rce/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>No .php, No Problem: Executing PHP Through Unexpected Paths</title>
      <link>https://hussienmisbah.github.io/posts/web-exploitation/2026-04-30-executing-php-through-unexpected-paths/</link>
      <pubDate>Thu, 30 Apr 2026 12:49:18 +0200</pubDate>
      <guid>https://hussienmisbah.github.io/posts/web-exploitation/2026-04-30-executing-php-through-unexpected-paths/</guid>
      <description>&lt;p&gt;In a recent project i came across a file upload function which i really love to spend time understanding how it exactly works to ensure either it can be exploited or not. the interesting thing which makes me write this blog is the bypass idea which is not really common and btw i spent much time chatting with ai platforms to get suggestions and none of them directed me through this path to be honest it was 6 months ago so maybe it can now :&amp;ldquo;D&lt;/p&gt;</description>
    </item>
    <item>
      <title>EGCERT-CTF JDBCLeak Exploit</title>
      <link>https://hussienmisbah.github.io/posts/code-review/2025-05-29-jdbcleak-egcert-finals/</link>
      <pubDate>Wed, 28 May 2025 12:49:18 +0200</pubDate>
      <guid>https://hussienmisbah.github.io/posts/code-review/2025-05-29-jdbcleak-egcert-finals/</guid>
      <description>&lt;p&gt;&lt;em&gt;JDBCLeak Leak was a challenge introducted in EGCERT CTF Finals 2025 under the category R&amp;amp;D , tbh i didn&amp;rsquo;t even look at the challenge during CTF Time , didn&amp;rsquo;t expect this category to introduce such good example of a real case code review challenge , however after reading the author&amp;rsquo;s blog &lt;a href=&#34;https://bitthebyte.medium.com/here-is-what-you-missed-during-the-egcert-ctf-2025-finals-927297143d9a&#34; target=&#34;_blank&#34; rel=&#34;noopener noreffer &#34;&gt;here&lt;/a&gt; about the category and challenge i thought of trying it myself and create a POC for it to get rce reading /flag.txt , we got 3rd place btw :&amp;ldquo;D&lt;/em&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Devzat Hackthebox writeup</title>
      <link>https://hussienmisbah.github.io/posts/linux-machines/2022-03-11-devzat/</link>
      <pubDate>Fri, 11 Mar 2022 00:45:12 +0900</pubDate>
      <guid>https://hussienmisbah.github.io/posts/linux-machines/2022-03-11-devzat/</guid>
      <description>&lt;p&gt;In this Hackthebox we will get a user access through a command injection in a vhost , then will make port forwarding to find a service that will give us the password for another user who have access to some backups, in this backups we can find the source-code for a bot , the bot has 2 versions one of them is running locally and it has a command &amp;ldquo;file&amp;rdquo; which allows us to read any file on the sytsem we will make port forwarding one more time to read the root private key and login as root&lt;/p&gt;</description>
    </item>
    <item>
      <title>Previse Hackthebox writeup</title>
      <link>https://hussienmisbah.github.io/posts/linux-machines/2022-01-27-previse/</link>
      <pubDate>Thu, 27 Jan 2022 00:45:08 +0200</pubDate>
      <guid>https://hussienmisbah.github.io/posts/linux-machines/2022-01-27-previse/</guid>
      <description>&lt;p&gt;In this Writeup you will find walkthrough of the retired machine previse From Hackthebox&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
