Description Learn how to leverage AttackerKB and learn about exploits in your workflow! Room Attacker KB OS Linux Difficulty ...
Oct 21 2022-10-21T00:00:00+05:30
Description This is a fun box where you will get to exploit the system in several ways. Few intended and unintended paths to getting user and root access. Room All in One ...
Oct 21 2022-10-21T00:00:00+05:30
Description Exploit Jenkins to gain an initital shell, then escalate your privileges by exploiting Windows authentication tokens. Room Alfred OS W...
Oct 21 2022-10-21T00:00:00+05:30
Description Vulnerability allow a authenticated user whith low privilages upload a malicious WAV file that could lead to remote arbitrary file disclosure and server-side request forgery (SSRF). ...
Oct 20 2022-10-20T00:00:00+05:30
Description Learn how to use a Java Serialisation attack in this boot-to-root Room Tony the Tiger OS Linux Difficulty Easy ...
Oct 20 2022-10-20T00:00:00+05:30
Description Beginner friendly boot2root machine Room Team OS Linux Difficulty Easy Creator dalemazza ...
Oct 20 2022-10-20T00:00:00+05:30
Description Help Sebastian and his team of investigators to withstand the dangers that come ahead. Room Psycho Break OS Linux Diff...
Oct 20 2022-10-20T00:00:00+05:30
Description The sys admin set up a rdbms in a safe way. Room Poster OS Linux Difficulty Easy Creator s...
Oct 20 2022-10-20T00:00:00+05:30
Description Practice Food KoTH alone, to get familiar with KoTH! Room KoTH Food CTF OS Linux Difficulty Easy ...
Oct 20 2022-10-20T00:00:00+05:30
Description Hack this machine and get the flag. There are lots of hints along the way and is perfect for beginners! Room Fowsniff CTF OS Linux ...
Oct 20 2022-10-20T00:00:00+05:30