Type your comment> @mab said:
Many Thanks Mab for your support!
Is there another way for rooting other than the one described here? I found it CTF like, how the first one linked the monitoring processes and the trigger !
Type your comment> @walksthewires said:
> Stranded at the end of the tunnel, with a login screen to the admin panel.
> So far so good, also found a couple other interesting files and directories. So, can you find some credentials…
Type your comment> @gregX01 said:
* one POST params could be exploitable for OS commands
* By using 1st hint, you could download two .pem files
* combine them to generate .pfx file (Convert a PEM Certificate to PFX format)
* use hint3, t…
using HxxxDxxxZ application vuln, you can get user access.
For the exploit, the path should be the path to upload folder and not to HxxxDxxxZ's root folder as mentionned in the exploit
expolit is independ with your TimeZone as it use timestam…