<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Feroxbuster on Chief Dennis' Blog</title><link>https://chiefdennis.github.io/tags/feroxbuster/</link><description>Recent content in Feroxbuster on Chief Dennis' Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Thu, 11 Dec 2025 13:07:16 +0100</lastBuildDate><atom:link href="https://chiefdennis.github.io/tags/feroxbuster/index.xml" rel="self" type="application/rss+xml"/><item><title>Sorcerer Offsec Walkthrough</title><link>https://chiefdennis.github.io/posts/offsec_sorcerer/</link><pubDate>Thu, 11 Dec 2025 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/offsec_sorcerer/</guid><description>&lt;h2 id="sorcerer-offsec-walkthrough">
 Sorcerer OffSec Walkthrough
 &lt;a class="heading-link" href="#sorcerer-offsec-walkthrough">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>&lt;img src="https://chiefdennis.github.io/posts/offsec_sorcerer/Picture_0.png" alt="image">&lt;/p>
&lt;h3 id="1-introduction">
 1. Introduction
 &lt;a class="heading-link" href="#1-introduction">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h3>
&lt;p>This walkthrough documents the compromise of the Sorcerer machine from CyberSecLabs (CFT).&lt;/p>
&lt;p>We compromised the Sorcerer machine through classic multi-surface enumeration: multiple web servers, exposed ZIP archives leaking Tomcat credentials and SSH keys, restricted SSH bypass through editing authorized_keys, and final privilege escalation via a misconfigured SUID start-stop-daemon binary (GTFOBins).&lt;/p></description></item><item><title>Cockpit Offsec Walkthrough</title><link>https://chiefdennis.github.io/posts/offsec_cockpit/</link><pubDate>Sun, 18 May 2025 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/offsec_cockpit/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/offsec_cockpit/image0.png" alt="image">&lt;/p>
&lt;h2 id="introduction">
 Introduction
 &lt;a class="heading-link" href="#introduction">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;h3 id="sql-injection-vulnerability">
 SQL injection vulnerability
 &lt;a class="heading-link" href="#sql-injection-vulnerability">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h3>
&lt;p>A SQL Injection (SQLi) vulnerability is one of the most critical threatsin web applications that interact with databases. This vulnerability occurs when an application does not properly validate and sanitize user input before using it in SQL queries, allowing an attacker to manipulate these queries to access, modify, or delete data in the database.&lt;/p></description></item><item><title>DVR4 Offsec Walkthrough</title><link>https://chiefdennis.github.io/posts/offsec_dvr4/</link><pubDate>Tue, 01 Apr 2025 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/offsec_dvr4/</guid><description>&lt;h2 id="dvr4-offsec-walkthrough">
 DVR4 Offsec Walkthrough
 &lt;a class="heading-link" href="#dvr4-offsec-walkthrough">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>&lt;img src="https://chiefdennis.github.io/posts/offsec_dvr4/Picture23.png" alt="image">&lt;/p>
&lt;h3 id="lfi-vulnerability">
 LFI Vulnerability
 &lt;a class="heading-link" href="#lfi-vulnerability">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h3>
&lt;p>Local File Inclusion (LFI) is a security vulnerability in web applications that allows an attacker to access files stored on the server. This failure occurs when an applicationconstructs file paths based on user input without properly validating its contents. As a result, an attacker can manipulate those paths to read sensitive system files and, in some cases, execute malicious code.&lt;/p></description></item><item><title>Snookum Offsec Walkthrough</title><link>https://chiefdennis.github.io/posts/offsec_snookum/</link><pubDate>Sun, 16 Mar 2025 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/offsec_snookum/</guid><description>&lt;h2 id="snookum-offsec-walkthrough">
 Snookum OffSec Walkthrough
 &lt;a class="heading-link" href="#snookum-offsec-walkthrough">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;h3 id="rfi-vulnerability">
 RFI Vulnerability
 &lt;a class="heading-link" href="#rfi-vulnerability">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h3>
&lt;p>Remote File Inclusion (RFI) is a vulnerability in web applications that allows an attacker to upload and execute files hosted on external servers. This flaw occurs when an applicationdynamically includes files without properly validating user input, which can lead to the execution of malicious code. If proper security measures are not taken, RFI can completely compromise a system, facilitating data theft, malware execution, or even full control of the server.&lt;/p></description></item></channel></rss>