After studying for OSCE (which I take next week) and preparing for interviews, I haven’t had much time to get back to my favorite productive procrastination activity: boot 2 roots! As I separate from the Air Force, I’ve had time to tackle some more, so I’d like to present my solution for H.A.S.T.E.! Let’s get started.
Hey everyone! It’s been a busy month with work and other life. Fortunately, I had time to work on Proteus, a new boot2root posted on https://www.vulnhub.com/entry/proteus-1,193/. This was a classic design with only a webapp and one flag for achieving root. The hardest work was certainly getting that initial reverse shell. Let’s check out how to root it!
Another quick picoCTF challenge. This one was a easy challenge on reading and understanding x86 assembly. Let’s take a look.
picoCTF was long over, but I decided to work on some of the challenges just for practice anyways. Just No was a quick and easy challenge, but I decided to write about it because the flaw is all too real.
As I try and get my RE skills back up after some months off, my friend told me about http://pwnable.tw: a site that host a number of Linux binary challenges. I decided to do a write-up on ORW, and I may do a few private ones on some of the harder ones (if I get them!)
Wallaby’s Nightmare is a boot2root from vulnhub.com…
Continue reading “Wallaby’s Nightmare”