Skip to main content

4 docs tagged with "Provider/ProvingGrounds"

View all tags

Exfiltrated

In this lab, FTP will be brute-forced using default credentials, and a pcap file will be analyzed, leading to remote code execution in the exif tool. Privilege escalation will then be achieved by exploiting a vulnerable version of the policykit-1 package. This lab focuses on brute-force techniques and privilege escalation methods.

Exghost

In this lab, FTP will be brute-forced using default credentials, and a pcap file will be analyzed, leading to remote code execution in the exif tool. Privilege escalation will then be achieved by exploiting a vulnerable version of the policykit-1 package. This lab focuses on brute-force techniques and privilege escalation methods.

Fanatastic

This lab will be exploited by leveraging vulnerabilities identified in Grafana v8.3.0. Publicly available exploits will be used to obtain a secret key, which will then be decrypted to retrieve the system admin password, allowing for root-level access to the system. This lab focuses on exploiting application vulnerabilities and privilege escalation methods.

Twiggy

In this lab, we will gain access by exploiting a pre-auth remote code execution vulnerability on a SaltStack master. This will allow us to execute commands on the master by creating a runner of salt.cmd using the cmd.exec_code function. This exercise enhances your skills in exploiting vulnerabilities for command execution and system access.