zacheller@home:~/blog$

  • Exploit Analysis - OpenNetAdmin 18.1.1 RCE

    While doing the OpenAdmin challenge on HackTheBox I used an exploit for OpenNetAdmin 18.1.1 that allowed Remote Code Execution. On a normal Kali install, this exploit can be found here: /usr/share/exploitdb/exploits/php/webapps/47691.sh. I wanted to dive a little deeper into how the script worked, so I reformatted it to be more...

  • SecWiki Launch

    I keep a lot of notes on the topics, tools, and challenges I come across in my exploration of cybersecurity. Up until now, I’ve been keeping my notes across a few increasingly bloated CherryTree files. I have started to move everything to a GitBook to be a living resource for...

  • Defend The Web - World of Peacecraft / Realistic

    Navigate to https://defendtheweb.net/extras/playground/real/1/email/. In your email Trash folder is an email from uStudio with a password in plaintext. There is an activate account email from World of Peacecraft in your inbox which contains a link to http://www.wop.com/activate. Simply enter the password in the form, and the challenge is solved.

  • Webinar - Attacking SQL Server CLR Assemblies

    Presented by Scott Sutherland @ NetSPI Description During this webinar we’ll be reviewing how to create, import, export, and modify CLR assemblies in SQL Server with the goal of privilege escalation, OS command execution, and persistence. Scott will also share a few PowerUpSQL functions that can be used to execute...