0xd4y

0xd4y

Senior Penetration Tester | Red Teamer | Global Top 0.1% at TryHackMe and HackTheBox

┌─[0xd4y@Writeup]─[/root/Writeups]
└──╼
$
bash ~/welcome.sh



Hacking in the Cloud - vulnerable_lambda

Hacking in the Cloud - vulnerable_lambda

This is the first scenario in the CloudGoat series. We start off as a low-privileged user that can assume a role which gives Lambda:Invoke permissions. Using this permission we are able to exploit a high-privileged Lambda function via an SQL injection and obtain Administrator access.

in
AWS Security Specialty Notes

AWS Security Specialty Notes

Notes that I wrote in preparation for the Certified AWS Security - Specialty exam. These notes cover fundamental information about the AWS infrastructure. It is recommended that you install Obsidian and download the zip file instead. This way you can navigate through these notes a lot more quickly.

in
How To Hack Any Flash Game

How To Hack Any Flash Game

This video showcases how to hack any flash game using BurpSuite and JPEXS Decompiler. Note that the information showed in this video should not be used for any illegal purposes.

in
Writer Writeup

Writer Writeup

This system contained an SQL injection vulnerability which could be leveraged to not only log into an application with admin privileges, but also could be used to read local files on the target. After leaking the source code of the website, an insecure usage of handling files was exploited to get RCE. With a www-data shell on the system, an insecure password of a local user located in the SQL database was cracked. Eventually the system was fully compromised through misconfigurations relating to SMTP and APT.

in
Ret2The-Unknown Writeup

Ret2The-Unknown Writeup

This challenge was about exploiting a binary via a return-to-libc attack (due to the enabled NX bit). The address of printf was provided to faciliate exploitation, however it was only given after passing in user input. This address could not be used for future execution of the binary due to the presence of ASLR. Nevertheless, despite the presence of the enabled NX bit and ASLR, the binary was vulnerable.

in
Passcode Writeup

Passcode Writeup

scanf() is a function that is widely used in C programs. This binary, which is seemingly secure, made subtle but dangerous programming mistakes that resulted in a security hole through which a user can manipulate memory. Since this binary is dynamically linked, overwriting the GOT entry subsequently forces the program to jump to memory of the attacker’s choice when the manipulated function pointer gets called.

in
You Know Writeup

You Know Writeup

This challenge involved exploiting a vulnerable program that did not perform proper boundary checks as due to the gets() function.

in
Toxic Writeup

Toxic Writeup

This was a challenge hosted on HackTheBox that involved exploting a PHP deserilization vulnerability to gain LFI and eventually RCE.

in