People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!
"chmod 777 /etc/environment"/etc/environment of the system allows for the executing of arbitrary shell scripts at reboot. So, this is just shell script code execution because of bad permissions. Request.PathInfo parameter with the SkipAuthorization flag, all auth can be skipped on the API. With this auth bypass, arbitrary commands can be used on the remote machine to pop a shell. selinux_enforcing to 0 and set the credentials of the current process to the inits process. execve but prior to the UID check being made. So, but running this action (unveil) a bunch of times, the race becomes more winnable. setuid(0) to escalate privileges to root. Then, pop a shell by running execve("/bin/sh") with parameters passed in by argv. setuid of the program state is set prior to the program being loaded. At this point (of the setuid being set for the program), the original credentials are committed, making it impossible to use the ptrace API. Additionally, the loader is loaded at a random address in memory in order to force a memory leak to take place now. chroot is a system call is that meant to restrict access to the rest of the file system. In essence, it gives the user a pseudo-root directory. This is commonly referred to as chroot jail. chrdir (chroot directory) is accessible. If this fails, it jumps to some unintended code at a goto label. Now, ftpd still awaits a new login, but the connection is already locked inside the chroot jail from the previous logic. This causes incorrect behavior during the next login attempt on that connection. chdir fail by using chmod 0. Why is having this fail useful? The ftpd itself gets trapped in chroot jail!indexOf instead of the charAt function on a string. The indexOf function finds the first occurrence of a character in a string. Clearly, the code newPasswordHash.indexOf(i) == currentPasswordHash.indexOf(i) has an issue.