WireHawk Security’s Post

Just published: a step-by-step walkthrough of Artificial (Hack The Box) where I walk through a web-to-root chain: abusing a TensorFlow model upload for RCE to get a web reverse shell, discovering a sqlite users.db and cracking hashes for SSH access, extracting weakly protected backup credentials, then abusing the Backrest backup/restore flow (and restic) to restore /root and claim root. If you want a practical example of how exposed application data, weakly protected credentials, and misconfigured backup tooling turn limited access into full system compromise, this one’s for you. 🔗: https://lnkd.in/gxn3s__T #InfoSec #CyberSecurity #Pentesting #HackTheBox #CTF #ApplicationSecurity

To view or add a comment, sign in

Explore content categories