HackTheBox – Frolic



00:00 – introduction to the box
00:25 – basic enumeration (nmap, nikto, gobuster)
03:56 – /admin directory inspection
05:15 – beginning of a very long decoding challenge
08:00 – login in /playsms
09:00 – usage of metasploit to obtain user shell
13:18 – user.txt
13:37 – ret2libc attack, see reference articles below
20:22 – root shell
20:44 – root.txt

Here you have a list of useful reference articles:

Leave a Reply

Your email address will not be published. Required fields are marked *