
Road
Inspired by a real-world pentesting engagement
CTF va kiber xavfsizlik bo'yicha batafsil yechimlar va tajribalar
Inspired by a real-world pentesting engagement
First room of the Red Stone series. Hack ruby using ruby.
Fluffy is a Windows machine that involves abusing a writable SMB share, capturing NTLM hashes, and using shadow credentials with …
Easy | Linux
Red Team | The city forgot to close its gate.
Sharpen your cryptography skills by analyzing code to get the flag.
"Administrator" - bu to'liq domenni buzish stsenariysi bo'yicha ishlab chiqilgan o'rtacha qiyinchilikdagi Windows mashinasi bo'lib, u erda imtiyozli foydalanuvchi uchun …
Cicada - bu boshlang'ich Active Directory ro'yxati va ekspluatatsiyasiga qaratilgan oson va qiyin Windows mashinasi...
Compromise a Joomla CMS account via SQLi, practise cracking hashes and escalate your privileges by taking advantage of yum.
Bunda Fg'ansuskiy saytni buzib kirib, eskalatsiya qilib user.txt va root.txt fayllarini qo'lga kiritdim.
Oq atirgullar... oppoq atirgullar...
Penetration Testing Challenge
read flag.php -->LFI to RCE --> flag2.txt --> env --> flag3.txt -> backup.sh --> flag4.txt
Exp for silverpeas login—> check messages —> user.txt —> check logs —> root.txt
SQL inj —> Exp for PHP —> www-data —> authorized_keys —> user.txt —> exploit.timer —> root.txt
Exploiting poorly made custom chatting service written in a certain language...
VulnUpload -> crack database's password -> check backup automotion
An easy level machine with multiple ways to escalate privileges. By Hixec.
You've been hired by Billy Joel to get revenge on Ducky Inc...the company that fired him. Can you break into …