<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>s1gh.sh</title><description>Notes on security, systems, and adjacent things.</description><link>https://s1gh.sh/</link><item><title>Hack The Box: pivotapi</title><link>https://s1gh.sh/hackthebox-pivotapi-walkthrough/</link><guid isPermaLink="true">https://s1gh.sh/hackthebox-pivotapi-walkthrough/</guid><description>Writeup of the PivotAPI machine from Hack The Box</description><pubDate>Sat, 06 Nov 2021 16:09:00 GMT</pubDate></item><item><title>Hack The Box Business CTF 2021: BBQ</title><link>https://s1gh.sh/hackthebox-business-ctf-2021-fullpwn-bbq/</link><guid isPermaLink="true">https://s1gh.sh/hackthebox-business-ctf-2021-fullpwn-bbq/</guid><description>Writeup of the fullpwn challenge called BBQ from HackTheBox Business CTF 2021</description><pubDate>Mon, 26 Jul 2021 18:38:48 GMT</pubDate></item><item><title>Hack The Box Business CTF 2021: Larablog</title><link>https://s1gh.sh/hackthebox-business-ctf-2021-web-larablog/</link><guid isPermaLink="true">https://s1gh.sh/hackthebox-business-ctf-2021-web-larablog/</guid><description>Writeup of the web challenge called Emergency from HackTheBox Business CTF 2021</description><pubDate>Mon, 26 Jul 2021 17:53:27 GMT</pubDate></item><item><title>Hack The Box Business CTF 2021: Emergency</title><link>https://s1gh.sh/hackthebox-business-ctf-2021-web-emergency/</link><guid isPermaLink="true">https://s1gh.sh/hackthebox-business-ctf-2021-web-emergency/</guid><description>Writeup of the web challenge called Emergency from HackTheBox Business CTF 2021</description><pubDate>Sun, 25 Jul 2021 20:42:42 GMT</pubDate></item><item><title>Hack The Box Business CTF 2021: NoteQL</title><link>https://s1gh.sh/hackthebox-business-ctf-2021-web-noteql/</link><guid isPermaLink="true">https://s1gh.sh/hackthebox-business-ctf-2021-web-noteql/</guid><description>Writeup of the web challenge called NoteQL from HackTheBox Business CTF 2021</description><pubDate>Sun, 25 Jul 2021 19:21:11 GMT</pubDate></item><item><title>Hack The Box Business CTF 2021: Time</title><link>https://s1gh.sh/hackthebox-business-ctf-2021-web-time/</link><guid isPermaLink="true">https://s1gh.sh/hackthebox-business-ctf-2021-web-time/</guid><description>Writeup of the web challenge called Time from HackTheBox Business CTF 2021</description><pubDate>Sun, 25 Jul 2021 19:09:10 GMT</pubDate></item><item><title>Hack The Box Business CTF 2021: discordvm</title><link>https://s1gh.sh/hackthebox-business-ctf-2021-misc-discordvm/</link><guid isPermaLink="true">https://s1gh.sh/hackthebox-business-ctf-2021-misc-discordvm/</guid><description>Writeup of the misc challenge called discordvm from HackTheBox Business CTF 2021</description><pubDate>Sun, 25 Jul 2021 18:34:55 GMT</pubDate></item><item><title>Hack The Box: Breadcrumbs</title><link>https://s1gh.sh/hackthebox-breadcrumbs-walkthrough/</link><guid isPermaLink="true">https://s1gh.sh/hackthebox-breadcrumbs-walkthrough/</guid><description>New weekly challenge that contains forging of Json Web Tokens, bruteforcing of session cookies, SQLi and more.</description><pubDate>Fri, 16 Jul 2021 18:55:00 GMT</pubDate></item><item><title>Discord DLL Hijacking</title><link>https://s1gh.sh/discord-dll-hijacking-persistence/</link><guid isPermaLink="true">https://s1gh.sh/discord-dll-hijacking-persistence/</guid><description>By hijacking a DLL we can use Discord as a way of getting persistence on a compromised system. Nothing new but a fun experiment nonetheless.</description><pubDate>Fri, 04 Jun 2021 09:57:04 GMT</pubDate></item><item><title>PDF + JavaScript = MFT Corruption?</title><link>https://s1gh.sh/pdf-possible-mft-corruption/</link><guid isPermaLink="true">https://s1gh.sh/pdf-possible-mft-corruption/</guid><description>By embedding specially crafted JS into a PDF, we can trigger a recently discovered vulnerability in the NTFS driver and potentially corrupt the MFT.</description><pubDate>Sun, 24 Jan 2021 19:57:24 GMT</pubDate></item><item><title>CVE-2020-27985 - Security Onion - Local Privilege Escalation</title><link>https://s1gh.sh/cve-2020-27985-security-onion-local-privilege-escalation/</link><guid isPermaLink="true">https://s1gh.sh/cve-2020-27985-security-onion-local-privilege-escalation/</guid><description>Security Onion V2 prior to v2.3.10 ships with a sudo misconfiguration that lets local users get root by editing so-setup, no password needed.</description><pubDate>Fri, 20 Nov 2020 15:41:41 GMT</pubDate></item><item><title>Ho-Ho-Honeypot</title><link>https://s1gh.sh/ho-ho-honeypot/</link><guid isPermaLink="true">https://s1gh.sh/ho-ho-honeypot/</guid><description>The holiday season is nearly upon us and it&apos;s time to get into the christmas spirit. And what better way to do exactly that than to combine a christmas tree with cyber security?</description><pubDate>Sun, 15 Nov 2020 20:48:31 GMT</pubDate></item><item><title>TryHackMe: Ra</title><link>https://s1gh.sh/tryhackme-ra/</link><guid isPermaLink="true">https://s1gh.sh/tryhackme-ra/</guid><description>New weekly challenge on THM. This writeup covers CrackMapExec, Evil-WinRM, a new CVE in Spark and more.</description><pubDate>Thu, 16 Jul 2020 22:00:00 GMT</pubDate></item><item><title>ListCombine</title><link>https://s1gh.sh/tool-listcombine/</link><guid isPermaLink="true">https://s1gh.sh/tool-listcombine/</guid><description>So, this isn&apos;t a new, groundbreaking tool. Tools used to combine wordlists have existed since... forever. The problem is that I often find myself in the situation where I need a simple tool to create a combined wordlist, using either a prepend or append method.</description><pubDate>Fri, 26 Jun 2020 20:18:18 GMT</pubDate></item><item><title>TryHackMe: Wonderland</title><link>https://s1gh.sh/tryhackme-wonderland/</link><guid isPermaLink="true">https://s1gh.sh/tryhackme-wonderland/</guid><description>New week, new challenge. This is my writeup of the Wonderland machine.</description><pubDate>Fri, 05 Jun 2020 23:24:43 GMT</pubDate></item><item><title>CVE-2020-13448 - QuickBox -  Authenticated RCE/Privilege Escalation</title><link>https://s1gh.sh/cve-2020-13448-quickbox-authenticated-rce/</link><guid isPermaLink="true">https://s1gh.sh/cve-2020-13448-quickbox-authenticated-rce/</guid><description>QuickBox CE &lt;= v2.5.5 and QuickBox Pro &lt;= 2.1.8 are both affected by an authenticated remote code execution (RCE) and privilege escalation vulnerability. A low-privileged user can execute arbitary commands on the server with the privileges of the user running the web server...</description><pubDate>Fri, 29 May 2020 08:31:38 GMT</pubDate></item><item><title>Hack The Box: RedCross</title><link>https://s1gh.sh/hackthebox-redcross-walkthrough/</link><guid isPermaLink="true">https://s1gh.sh/hackthebox-redcross-walkthrough/</guid><description>This is a writeup of the retired Hack The Box RedCross machine.</description><pubDate>Sat, 13 Apr 2019 02:30:00 GMT</pubDate></item><item><title>Vulnhub: DC-4</title><link>https://s1gh.sh/vulnhub-dc-4/</link><guid isPermaLink="true">https://s1gh.sh/vulnhub-dc-4/</guid><description>Writeup of DC-4 from Vulnhub. Another beginner-to-intermediate box from the DC series.</description><pubDate>Tue, 09 Apr 2019 18:17:19 GMT</pubDate></item><item><title>Lin.Security</title><link>https://s1gh.sh/lin-security/</link><guid isPermaLink="true">https://s1gh.sh/lin-security/</guid><description>Working through the Lin.Security box to practice Linux privilege escalation across a bunch of misconfigured SUDO entries.</description><pubDate>Sat, 06 Apr 2019 19:55:09 GMT</pubDate></item><item><title>Vulnhub: DC-3</title><link>https://s1gh.sh/vulnhub-dc-3/</link><guid isPermaLink="true">https://s1gh.sh/vulnhub-dc-3/</guid><description>Writeup of DC-3 from Vulnhub. One port, one flag, Joomla.</description><pubDate>Sat, 06 Apr 2019 15:51:54 GMT</pubDate></item><item><title>Vulnhub: DC-2</title><link>https://s1gh.sh/vulnhub-dc-2/</link><guid isPermaLink="true">https://s1gh.sh/vulnhub-dc-2/</guid><description>Today we are solving DC-2. This machine is created by DCAU7 who also created DC-1. Even though the machine is for beginners I figured I could try and solve it anyway.</description><pubDate>Sun, 24 Mar 2019 20:16:07 GMT</pubDate></item><item><title>Vulnhub: RootThis 1</title><link>https://s1gh.sh/vulnhub-rootthis/</link><guid isPermaLink="true">https://s1gh.sh/vulnhub-rootthis/</guid><description>Writeup of the RootThis: 1 machine from Vulnhub.</description><pubDate>Sat, 16 Mar 2019 22:51:50 GMT</pubDate></item><item><title>Vulnhub: unknowndevice64</title><link>https://s1gh.sh/vulnhub-unknowndevice64/</link><guid isPermaLink="true">https://s1gh.sh/vulnhub-unknowndevice64/</guid><description>Today we are solving &quot;unknowndevice64&quot; from Vulnhub - the most recent machine as of this writing.</description><pubDate>Wed, 13 Mar 2019 21:30:55 GMT</pubDate></item><item><title>Vulnhub: ch4inrulz: 1.0.1</title><link>https://s1gh.sh/vulnhub-ch4inrulz-1-0-1/</link><guid isPermaLink="true">https://s1gh.sh/vulnhub-ch4inrulz-1-0-1/</guid><description>Writeup of CH4INRULZ. LFI to image upload bypass to RCE, then DirtyCow for privilege escalation.</description><pubDate>Fri, 08 Mar 2019 21:21:46 GMT</pubDate></item><item><title>Vulnhub: digitalworld.local: MERCY v2</title><link>https://s1gh.sh/vulnhub-mercy-2/</link><guid isPermaLink="true">https://s1gh.sh/vulnhub-mercy-2/</guid><description>Writeup of MERCY v2 from digitalworld.local, a machine built for practicing OSCP-style enumeration and exploitation.</description><pubDate>Sun, 03 Mar 2019 00:15:29 GMT</pubDate></item><item><title>Vulnhub: Casino Royale 1</title><link>https://s1gh.sh/vulnhub-casino-royale-1/</link><guid isPermaLink="true">https://s1gh.sh/vulnhub-casino-royale-1/</guid><description>This is a writeup of the recently released Casino Royale: 1 machine from Vulnhub</description><pubDate>Sat, 02 Mar 2019 16:07:52 GMT</pubDate></item><item><title>Hack The Box: Sneaky</title><link>https://s1gh.sh/hackthebox-sneaky-walkthrough/</link><guid isPermaLink="true">https://s1gh.sh/hackthebox-sneaky-walkthrough/</guid><description>This is a writeup of the retired Hack The Box Sneaky machine.</description><pubDate>Thu, 10 Jan 2019 18:47:39 GMT</pubDate></item><item><title>Hack The Box: Devel</title><link>https://s1gh.sh/hackthebox-devel-walkthrough/</link><guid isPermaLink="true">https://s1gh.sh/hackthebox-devel-walkthrough/</guid><description>This is a writeup of the retired Hack The Box Devel machine.</description><pubDate>Wed, 09 Jan 2019 17:42:56 GMT</pubDate></item><item><title>Hack The Box: Jerry</title><link>https://s1gh.sh/hackthebox-jerry-walkthrough/</link><guid isPermaLink="true">https://s1gh.sh/hackthebox-jerry-walkthrough/</guid><description>This is a writeup of the retired Hack The Box Jerry machine.</description><pubDate>Wed, 02 Jan 2019 19:36:55 GMT</pubDate></item><item><title>Hack The Box: Waldo</title><link>https://s1gh.sh/hackthebox-waldo-walkthrough/</link><guid isPermaLink="true">https://s1gh.sh/hackthebox-waldo-walkthrough/</guid><description>This is a writeup of the retired Hack The Box Waldo machine.</description><pubDate>Tue, 01 Jan 2019 09:28:00 GMT</pubDate></item><item><title>Hack The Box: DevOops</title><link>https://s1gh.sh/hackthebox-devoops-walkthrough/</link><guid isPermaLink="true">https://s1gh.sh/hackthebox-devoops-walkthrough/</guid><description>This is a writeup of the retired Hack The Box Devoops machine.</description><pubDate>Mon, 31 Dec 2018 13:48:00 GMT</pubDate></item></channel></rss>