This post details a walkthrough of the Proving Grounds: BadCorp challenge, rated as very hard by the community. It covers steps from initial scanning and enumeration to finding an SSH private key and using it to gain access. The post highlights methods used for privilege escalation, including reverse engineering a binary with Ghidra and crafting a payload for command injection to achieve root access.

4m read timeFrom systemweakness.com
Post cover image
Table of contents
ScanningEnumerationInitial FootholdPrivilege Escalation

Sort: