The post discusses the process of gaining initial access to the Keeper machine on HackTheBox, exploiting a vulnerability in the Request Tracker web service. It covers the enumeration, initial access, and privilege escalation steps. The post emphasizes the importance of misconfiguration, default credentials, and information disclosure.

2m read timeFrom systemweakness.com
Post cover image
Table of contents
PRIVILEGE ESCALATIONCONCLUSION

Sort: