<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://mohamed-ahmed-salah.github.io/</id><title>1of0</title><subtitle>In a world of 1s and 0s, I am undefined.</subtitle> <updated>2025-02-14T23:12:47+02:00</updated> <author> <name>1of0</name> <uri>https://mohamed-ahmed-salah.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://mohamed-ahmed-salah.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://mohamed-ahmed-salah.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2025 1of0 </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>TryHackMe: Cheese CTF</title><link href="https://mohamed-ahmed-salah.github.io/posts/Cheese-CTF/" rel="alternate" type="text/html" title="TryHackMe: Cheese CTF" /><published>2024-12-19T11:00:00+02:00</published> <updated>2025-02-14T22:42:49+02:00</updated> <id>https://mohamed-ahmed-salah.github.io/posts/Cheese-CTF/</id> <content type="text/html" src="https://mohamed-ahmed-salah.github.io/posts/Cheese-CTF/" /> <author> <name>1of0</name> </author> <category term="TryHackMe" /> <summary>In the Cheese CTF, we bypassed the login page using an SQL injection and discovered an endpoint vulnerable to LFI. By chaining PHP filters, we turned the LFI into RCE and gained an initial foothold on the system. After that, we exploited a writable authorized_keys file to pivot to another user. As this new user, we fixed a syntax error in a timer and used sudo privileges to start it, which allo...</summary> </entry> </feed>
