{"id":502,"date":"2026-01-09T19:28:55","date_gmt":"2026-01-09T19:28:55","guid":{"rendered":"https:\/\/rmfsales.com\/?p=502"},"modified":"2026-01-09T19:28:55","modified_gmt":"2026-01-09T19:28:55","slug":"hacking-19","status":"publish","type":"post","link":"https:\/\/rmfsales.com\/?p=502","title":{"rendered":"Offsec Proving Grounds Walkthrough &#8211; Filebrowser"},"content":{"rendered":"<p>Walkthrough of the machine called &#8220;Filebrowser&#8221; in the <a class=\"qZeTGqFRxixYywXeiJBKyqEkwEmzWYtTPNuLg \" tabindex=\"0\" href=\"https:\/\/www.linkedin.com\/company\/offsec-training\/\" target=\"_self\" data-test-app-aware-link=\"\">OffSec<\/a> Proving Grounds&#8230;don&#8217;t watch unless you want help getting through the machine. In this video we take advantage of weak credentials for an online file browsing application, take advantage of SSH keys, then escalate using incorrectly set SUID on a binary.<\/p>\n<div class=\"jetpack-video-wrapper\"><iframe loading=\"lazy\" title=\"Offsec Proving Grounds Walkthrough - Filebrowser\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/DHX2XFdpG5g?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Walkthrough of the machine called &#8220;Filebrowser&#8221; in the OffSec Proving Grounds&#8230;don&#8217;t watch unless you want help getting through the machine. In this video we take advantage of weak credentials for an online file browsing application, take advantage of SSH keys, then escalate using incorrectly set SUID on a binary.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[53,48,7,55,44,10,54],"tags":[51,13,28,57,46,15,56],"class_list":["post-502","post","type-post","status-publish","format-standard","hentry","category-ethical-hacking","category-hacking","category-linux","category-offsec","category-security","category-tutorial","category-walkthrough","tag-cybersecurity","tag-linux","tag-networking","tag-offsec","tag-security","tag-tutorial","tag-walkthrough"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/rmfsales.com\/index.php?rest_route=\/wp\/v2\/posts\/502","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rmfsales.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rmfsales.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rmfsales.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rmfsales.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=502"}],"version-history":[{"count":1,"href":"https:\/\/rmfsales.com\/index.php?rest_route=\/wp\/v2\/posts\/502\/revisions"}],"predecessor-version":[{"id":503,"href":"https:\/\/rmfsales.com\/index.php?rest_route=\/wp\/v2\/posts\/502\/revisions\/503"}],"wp:attachment":[{"href":"https:\/\/rmfsales.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=502"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rmfsales.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=502"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rmfsales.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=502"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}