Hack The Box Write-Up : Book

1. Executive Summary

2. Description

2.1 Enumeration

2.2 Exploitation

evil laugh
is it another insecure upload vulnerability????

2.3 Privilege Escalation

did you all get it?
Don’t stop until the listener give you a shell!

3. Reference

purple enthusiast