The post describes the author's findings while exploiting vulnerabilities in a web application. The author uncovers a hidden input vulnerability, abuse it to elevate privileges, bypass a filter to upload a webshell, trigger a DLL to be loaded, and reverse-engineer a .NET binary. They also explain how to extract an encryption key from the Windows registry.

32m read time From 0xdf.gitlab.io
Post cover image
Table of contents
Box InfoReconShell as svc_exampanelShell as devdocShell as administrator

Sort: