A detailed walkthrough of the HackTheBox 'Barrier' Linux machine involving multiple chained vulnerabilities. The attack path starts with exploiting CVE-2024-45409, a SAML signature bypass in GitLab's Ruby SAML library, to forge a SAML assertion and gain admin access to GitLab. From there, an Authentik API token stored in GitLab

24m read timeFrom 0xdf.gitlab.io
Post cover image
Table of contents
Box InfoReconShell as makiShell as maki_admShell as root

Sort: