0xdf.gitlab.io/2018/10/20/htb-tartarsauce.html

Preview meta tags from the 0xdf.gitlab.io website.

Linked Hostnames

10

Search Engine Appearance

Google

https://0xdf.gitlab.io/2018/10/20/htb-tartarsauce.html

HTB: TartarSauce

TartarSauce was a box with lots of steps, and an interesting focus around two themes: trolling us, and the tar binary. For initial access, I’ll find a barely functional WordPress site with a plugin vulnerable to remote file include. After abusing that RFI to get a shell, I’ll privesc twice, both times centered around tar; once through sudo tar, and once needing to manipulate an archive before a sleep runs out. In beyond root, I’ll look at some of the rabbit holes I went down, and show a short script I created to quickly get initial access and do the first privesc in one step.



Bing

HTB: TartarSauce

https://0xdf.gitlab.io/2018/10/20/htb-tartarsauce.html

TartarSauce was a box with lots of steps, and an interesting focus around two themes: trolling us, and the tar binary. For initial access, I’ll find a barely functional WordPress site with a plugin vulnerable to remote file include. After abusing that RFI to get a shell, I’ll privesc twice, both times centered around tar; once through sudo tar, and once needing to manipulate an archive before a sleep runs out. In beyond root, I’ll look at some of the rabbit holes I went down, and show a short script I created to quickly get initial access and do the first privesc in one step.



DuckDuckGo

https://0xdf.gitlab.io/2018/10/20/htb-tartarsauce.html

HTB: TartarSauce

TartarSauce was a box with lots of steps, and an interesting focus around two themes: trolling us, and the tar binary. For initial access, I’ll find a barely functional WordPress site with a plugin vulnerable to remote file include. After abusing that RFI to get a shell, I’ll privesc twice, both times centered around tar; once through sudo tar, and once needing to manipulate an archive before a sleep runs out. In beyond root, I’ll look at some of the rabbit holes I went down, and show a short script I created to quickly get initial access and do the first privesc in one step.

  • General Meta Tags

    9
    • title
      HTB: TartarSauce | 0xdf hacks stuff
    • name
      HTB: TartarSauce
    • charset
      utf-8
    • X-UA-Compatible
      IE=edge
    • viewport
      width=device-width, initial-scale=1
  • Open Graph Meta Tags

    6
    • og:title
      HTB: TartarSauce
    • US country flagog:locale
      en_US
    • og:description
      TartarSauce was a box with lots of steps, and an interesting focus around two themes: trolling us, and the tar binary. For initial access, I’ll find a barely functional WordPress site with a plugin vulnerable to remote file include. After abusing that RFI to get a shell, I’ll privesc twice, both times centered around tar; once through sudo tar, and once needing to manipulate an archive before a sleep runs out. In beyond root, I’ll look at some of the rabbit holes I went down, and show a short script I created to quickly get initial access and do the first privesc in one step.
    • og:url
      https://0xdf.gitlab.io/2018/10/20/htb-tartarsauce.html
    • og:site_name
      0xdf hacks stuff
  • Twitter Meta Tags

    2
    • twitter:card
      summary
    • twitter:site
      @0xdf_
  • Link Tags

    11
    • alternate
      https://0xdf.gitlab.io/feed.xml
    • canonical
      https://0xdf.gitlab.io/2018/10/20/htb-tartarsauce.html
    • icon
      /assets/icons/favicon-32x32.png
    • icon
      /assets/icons/favicon-16x16.png
    • stylesheet
      /assets/css/bootstrap-toc.min.css

Emails

1

Links

36