The post describes the process of compromising a web hosting company's website running on Java Spring Boot. It covers reconnaissance, web application analysis, command injection, database exploration, and privilege escalation through SSH ProxyCommand.
Sort: