<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://grok-rs.github.io/</id><title>dromix</title><subtitle>Personal blog for CTF writeups and security research</subtitle> <updated>2026-04-12T22:08:15+00:00</updated> <author> <name>grok-rs</name> <uri>https://grok-rs.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://grok-rs.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://grok-rs.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 grok-rs </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>TryHackMe: Pyrat</title><link href="https://grok-rs.github.io/posts/tryhackme-pyrat/" rel="alternate" type="text/html" title="TryHackMe: Pyrat" /><published>2025-12-26T00:00:00+00:00</published> <updated>2025-12-26T23:49:57+00:00</updated> <id>https://grok-rs.github.io/posts/tryhackme-pyrat/</id> <content type="text/html" src="https://grok-rs.github.io/posts/tryhackme-pyrat/" /> <author> <name>grok-rs</name> </author> <category term="TryHackMe" /> <summary>Walkthrough of TryHackMe Pyrat - exploiting a Python-based RAT via arbitrary code execution, extracting credentials from Git history, and brute-forcing an admin endpoint for root access.</summary> </entry> <entry><title>TryHackMe: LazyAdmin</title><link href="https://grok-rs.github.io/posts/tryhackme-lazyadmin/" rel="alternate" type="text/html" title="TryHackMe: LazyAdmin" /><published>2025-12-26T00:00:00+00:00</published> <updated>2025-12-26T00:00:00+00:00</updated> <id>https://grok-rs.github.io/posts/tryhackme-lazyadmin/</id> <content type="text/html" src="https://grok-rs.github.io/posts/tryhackme-lazyadmin/" /> <author> <name>grok-rs</name> </author> <category term="TryHackMe" /> <summary>Walkthrough of TryHackMe LazyAdmin - exploiting SweetRice CMS backup disclosure to obtain admin credentials, uploading a PHP webshell via the ads feature, and escalating to root through a writable shell script executed via sudo.</summary> </entry> <entry><title>TryHackMe: B3dr0ck</title><link href="https://grok-rs.github.io/posts/tryhackme-b3dr0ck/" rel="alternate" type="text/html" title="TryHackMe: B3dr0ck" /><published>2025-12-26T00:00:00+00:00</published> <updated>2025-12-26T23:53:07+00:00</updated> <id>https://grok-rs.github.io/posts/tryhackme-b3dr0ck/</id> <content type="text/html" src="https://grok-rs.github.io/posts/tryhackme-b3dr0ck/" /> <author> <name>grok-rs</name> </author> <category term="TryHackMe" /> <summary>Walkthrough of TryHackMe B3dr0ck - exploiting TLS certificate services to obtain credentials, using sudo certutil for lateral movement, and decoding multi-layered encoded passwords for root access.</summary> </entry> <entry><title>TryHackMe: Dreaming</title><link href="https://grok-rs.github.io/posts/tryhackme-dreaming/" rel="alternate" type="text/html" title="TryHackMe: Dreaming" /><published>2025-12-19T00:00:00+00:00</published> <updated>2025-12-26T23:49:57+00:00</updated> <id>https://grok-rs.github.io/posts/tryhackme-dreaming/</id> <content type="text/html" src="https://grok-rs.github.io/posts/tryhackme-dreaming/" /> <author> <name>grok-rs</name> </author> <category term="TryHackMe" /> <summary>A walkthrough of the Dreaming room on TryHackMe, exploiting Pluck CMS, command injection via MySQL, and Python library hijacking for privilege escalation.</summary> </entry> </feed>
