HackTheBox - Nibbles
In this post, I demonstrate how to identify a data validation vulnerability in an image upload plugin, and bypass content filters to execute malicious code and gain access to the remote system.
Enumeration
I run a standard nmap scan on the host to find ports 22 (SSH) and 80 (HTTP)