3 dead, 21 injured in Russian drone and missile attacks on Kharkiv
Ukraine says that a large Russian drone-and-missile attack has targeted the city of Kharkiv, killing at least three people and injuring 21.
More results...
Ukraine says that a large Russian drone-and-missile attack has targeted the city of Kharkiv, killing at least three people and injuring 21.
submitted by /u/K0TEM [link] [comments]
The deaths of the Decker sisters, whom police believe were killed by their father, have left communities throughout Washington grief-stricken and shaken.
Vice-president was interviewed by comedian Theo Von, who also asked him if he ‘got high’ on election nightJD Vance said Elon Musk was making a “huge mistake” going after Donald Trump in a storm of bitter and inflammatory social media posts after a fall…
Israel says it has retrieved the body of a Thai hostage in Gaza NPRBody of Thai hostage recovered from Gaza, Israel says BBCWhy were so many Thai farmers among the hostages held by Hamas? AP NewsIsraeli military says it…
Israel said it had retrieved the body of Nattapong Pinta, who was abducted during the Oct. 7, 2023, attack that sparked the war. He had come to Israel to work in agriculture.
The U.S. ambassador to Canada is pushing back on Ottawa’s travel advice, saying his country doesn’t search phones at the border and arguing some Americans travelling here are having a tough time.
🇮🇹🗳️ On June 8 and 9, #Italians will vote in five #referendums, including one proposing to reduce the residency requirement for #citizenship from 10 to five years – in line with neighbouring countries like #France, the #Netherlands, and #Germany.
FRA…
Air Force One is the call sign for any plane that’s carrying the president
Successfully rooted another Hack The Box machine by chaining multiple vulnerabilities across custom C2 frameworks. For the user flag, we exploited an SSRF vulnerability (CVE-2024-41570) in the Havoc C2 framework to access internal services, which we then chained with an authenticated RCE to execute arbitrary commands and gain a reverse shell as the ilya user. To maintain stable access, SSH keys were added for persistence, allowing us to retrieve the user.txt flag. For the root flag, we targeted the Hardhat C2 service by forging a valid JWT with a Python script to create an admin user, which provided shell access as sergej. Upon privilege escalation analysis, we found that sergej had sudo access to the iptables-save binary. This was abused to overwrite the /etc/sudoers file and escalate to root, ultimately retrieving the root.txt flag. Another great learning experience on the path to mastering offensive security!
#HackTheBox #CyberSecurity #InfoSec #RedTeam #CTF #PrivilegeEscalation #RCE #SSRF #Linux #HTB #EthicalHacking #PenetrationTesting #HavocC2 #HardhatC2 #JWT #SudoExploit #OSCP #BugBounty
The post Hack The Box: Backfire Machine Walkthrough – Medium Difficulty appeared first on Threatninja.net.