Skip to main content

One post tagged with "SUID Exploitation"

SUID exploitation involves manipulating setuid-root binaries to execute system-level privileges under the attacker's own user ID, granting elevated access and root-like capabilities.

View All Tags

HTB | Oopsie | Write-Up

· 16 min read

Summary:

This article guides users through completing the Oopsie machine challenge on Hack The Box. The steps outline a hacking scenario, from initial connection testing and scanning to exploiting vulnerabilities in a web application, including IDOR, cookie manipulation, and SUID exploitation, ultimately leading to gaining admin access and finally grabbing the root flag.

Machine Name: Oopsie | Difficulty: Easy | OS: Linux