
0xdf.gitlab.io/2020/08/13/htb-joker.html
Preview meta tags from the 0xdf.gitlab.io website.
Linked Hostnames
15- 36 links to0xdf.gitlab.io
- 3 links toapp.hackthebox.com
- 2 links togithub.com
- 2 links toyoutube.com
- 1 link togitlab.com
- 1 link togtfobins.github.io
- 1 link tohackthebox.com
- 1 link tohashcat.net
Thumbnail

Search Engine Appearance
HTB: Joker
Rooting Joker had three steps. The first was using TFTP to get the Squid Proxy config and creds that allowed access to a webserver listening on localhost that provided a Python console. To turn that into a shell, I’ll have to enumerate the firewall and find that I can use UDP. I’ll show two ways to abuse a sudo rule to make the second step. I can take advantage of the sudoedit_follow flag, or just abuse the wildcards in the rule. The final pivot to root exploits a cron running creating tar archives, and I’ll show three different ways to abuse it.
Bing
HTB: Joker
Rooting Joker had three steps. The first was using TFTP to get the Squid Proxy config and creds that allowed access to a webserver listening on localhost that provided a Python console. To turn that into a shell, I’ll have to enumerate the firewall and find that I can use UDP. I’ll show two ways to abuse a sudo rule to make the second step. I can take advantage of the sudoedit_follow flag, or just abuse the wildcards in the rule. The final pivot to root exploits a cron running creating tar archives, and I’ll show three different ways to abuse it.
DuckDuckGo

HTB: Joker
Rooting Joker had three steps. The first was using TFTP to get the Squid Proxy config and creds that allowed access to a webserver listening on localhost that provided a Python console. To turn that into a shell, I’ll have to enumerate the firewall and find that I can use UDP. I’ll show two ways to abuse a sudo rule to make the second step. I can take advantage of the sudoedit_follow flag, or just abuse the wildcards in the rule. The final pivot to root exploits a cron running creating tar archives, and I’ll show three different ways to abuse it.
General Meta Tags
10- titleHTB: Joker | 0xdf hacks stuff
- nameHTB: Joker
- charsetutf-8
- X-UA-CompatibleIE=edge
- viewportwidth=device-width, initial-scale=1
Open Graph Meta Tags
7- og:titleHTB: Joker
og:locale
en_US- og:descriptionRooting Joker had three steps. The first was using TFTP to get the Squid Proxy config and creds that allowed access to a webserver listening on localhost that provided a Python console. To turn that into a shell, I’ll have to enumerate the firewall and find that I can use UDP. I’ll show two ways to abuse a sudo rule to make the second step. I can take advantage of the sudoedit_follow flag, or just abuse the wildcards in the rule. The final pivot to root exploits a cron running creating tar archives, and I’ll show three different ways to abuse it.
- og:urlhttps://0xdf.gitlab.io/2020/08/13/htb-joker.html
- og:site_name0xdf hacks stuff
Twitter Meta Tags
2- twitter:cardsummary
- twitter:site@0xdf_
Link Tags
11- alternatehttps://0xdf.gitlab.io/feed.xml
- canonicalhttps://0xdf.gitlab.io/2020/08/13/htb-joker.html
- icon/assets/icons/favicon-32x32.png
- icon/assets/icons/favicon-16x16.png
- stylesheet/assets/css/bootstrap-toc.min.css
Emails
1Links
54- https://0xdf.gitlab.io
- https://0xdf.gitlab.io/2018/10/20/htb-tartarsauce.html#to-command
- https://0xdf.gitlab.io/2020/07/22/htb-shrek.html#chown-wildcard-exploit
- https://0xdf.gitlab.io/2020/08/13/htb-joker.html
- https://0xdf.gitlab.io/about