<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Restricted Shell on jckhmr.net</title>
    <link>https://jckhmr.net/tags/restricted-shell/</link>
    <description>Recent content in Restricted Shell on jckhmr.net</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <lastBuildDate>Sun, 19 Apr 2020 00:37:23 +0000</lastBuildDate>
    
	<atom:link href="https://jckhmr.net/tags/restricted-shell/index.xml" rel="self" type="application/rss+xml" />
    
    
    <item>
      <title>Lazy Sysadmin Vulnhub Writeup</title>
      <link>https://jckhmr.net/lazy-sysadmin-vulnhub-writeup/</link>
      <pubDate>Sun, 19 Apr 2020 00:37:23 +0000</pubDate>
      
      <guid>https://jckhmr.net/lazy-sysadmin-vulnhub-writeup/</guid>
      <description>&amp;lsquo;Lazysysadmin&amp;rsquo; is another of the targets as recommended by the excellent TJnull, in preparation for the OSCP. Lazysysadmin is considered an &amp;lsquo;easy&amp;rsquo; machine. Just for fun, we&amp;rsquo;ll take a look at a number of different exploitation routes as well as take a look at some post-exploitation activities (specifically data exfiltration or exfil). Exfil would obviously be of interest to a Red Team operator who is more more &amp;lsquo;goal driven&amp;rsquo; and not so fixated on gaining root.</description>
    </item>
    
  </channel>
</rss>