Skip to content
s1gh.sh

Archives

All the articles I've archived.

2021 10
November 1
July 7
June 1
  • Discord DLL Hijacking

    By hijacking a DLL we can use Discord as a way of getting persistence on a compromised system. Nothing new but a fun experiment nonetheless.

January 1
  • PDF + JavaScript = MFT Corruption?

    By embedding specially crafted JS into a PDF, we can trigger a recently discovered vulnerability in the NTFS driver and potentially corrupt the MFT.

2020 6
November 2
  • CVE-2020-27985 - Security Onion - Local Privilege Escalation

    Security Onion V2 prior to v2.3.10 ships with a sudo misconfiguration that lets local users get root by editing so-setup, no password needed.

  • Ho-Ho-Honeypot

    The holiday season is nearly upon us and it's time to get into the christmas spirit. And what better way to do exactly that than to combine a christmas tree with cyber security?

July 1
  • TryHackMe: Ra

    New weekly challenge on THM. This writeup covers CrackMapExec, Evil-WinRM, a new CVE in Spark and more.

June 2
  • ListCombine

    So, this isn't a new, groundbreaking tool. Tools used to combine wordlists have existed since... forever. The problem is that I often find myself in the situation where I need a simple tool to create a combined wordlist, using either a prepend or append method.

  • TryHackMe: Wonderland

    New week, new challenge. This is my writeup of the Wonderland machine.

May 1
  • CVE-2020-13448 - QuickBox - Authenticated RCE/Privilege Escalation

    QuickBox CE <= v2.5.5 and QuickBox Pro <= 2.1.8 are both affected by an authenticated remote code execution (RCE) and privilege escalation vulnerability. A low-privileged user can execute arbitary commands on the server with the privileges of the user running the web server...

2019 14
April 4
  • Hack The Box: RedCross

    This is a writeup of the retired Hack The Box RedCross machine.

  • Vulnhub: DC-4

    Writeup of DC-4 from Vulnhub. Another beginner-to-intermediate box from the DC series.

  • Lin.Security

    Working through the Lin.Security box to practice Linux privilege escalation across a bunch of misconfigured SUDO entries.

  • Vulnhub: DC-3

    Writeup of DC-3 from Vulnhub. One port, one flag, Joomla.

March 6
  • Vulnhub: DC-2

    Today we are solving DC-2. This machine is created by DCAU7 who also created DC-1. Even though the machine is for beginners I figured I could try and solve it anyway.

  • Vulnhub: RootThis 1

    Writeup of the RootThis: 1 machine from Vulnhub.

  • Vulnhub: unknowndevice64

    Today we are solving "unknowndevice64" from Vulnhub - the most recent machine as of this writing.

  • Vulnhub: ch4inrulz: 1.0.1

    Writeup of CH4INRULZ. LFI to image upload bypass to RCE, then DirtyCow for privilege escalation.

  • Vulnhub: digitalworld.local: MERCY v2

    Writeup of MERCY v2 from digitalworld.local, a machine built for practicing OSCP-style enumeration and exploitation.

  • Vulnhub: Casino Royale 1

    This is a writeup of the recently released Casino Royale: 1 machine from Vulnhub

January 4
2018 1
December 1