The post describes the process of compromising a web hosting company's website running on Java Spring Boot. It covers reconnaissance, web application analysis, command injection, database exploration, and privilege escalation through SSH ProxyCommand.

21m read time From 0xdf.gitlab.io
Post cover image
Table of contents
Box InfoReconShell as appShell as joshShell as root

Sort: