<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>CTF Boxes on Keyboard Cowboy</title>
    <link>http://2600.moe/tags/ctf-boxes/</link>
    <description>Recent content in CTF Boxes on Keyboard Cowboy</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Wed, 08 Jan 2025 23:59:21 -0500</lastBuildDate>
    <atom:link href="http://2600.moe/tags/ctf-boxes/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>PG Practice: Flow</title>
      <link>http://2600.moe/posts/2025-01-08-pg-practice-flow/</link>
      <pubDate>Wed, 08 Jan 2025 23:59:21 -0500</pubDate>
      <guid>http://2600.moe/posts/2025-01-08-pg-practice-flow/</guid>
      <description>Summary Flow contains a MLFlow install with several different vulnerabilities one of which allows for local file inclusion. After gaining a user shell by viewing ssh keys you&amp;rsquo;ll find the user has sudo privileges for a single set of options for a powerful command. This command can be abused to obtain root in one of two ways. I happened to stumble upon an interesting Python related one that differs from the intended machine solution.</description>
    </item>
  </channel>
</rss>
