curl -X POST -F "file=@malicious.pdf" http://10.10.11.231/uploads/ After uploading the malicious PDF file, we notice that the server is executing arbitrary commands. We can use this vulnerability to gain a foothold on the box.
After analyzing the pdfy binary, we notice that it is vulnerable to a buffer overflow exploit. We can use this vulnerability to gain root access. Pdfy Htb Writeup
nc -lvp 4444