Blog

CyberSecLabs – “Red” Walkthrough

Red is a beginner level box from CyberSecLabs hosting a webserver using a service known as Redis. I’ll show you the Metasploit route to get a shell, and then a manual method to get a shell. After we’ve established our foothold on the box, we’ll enumerate the file system where we’ll exploit a interesting file…

CyberSecLabs – “Imposter” Walkthrough

Imposter from CyberSecLabs is a beginner level Windows box hosting a Wing FTP server. After gaining access to the web admin console, we’ll get a reverse shell as a low privileged user and find a interesting way to escalate our privileges using a module in Meterpreter. Imposter’s IP address is 172.31.1.20. Let’s get started. Scanning…

CyberSecLabs – “Simple” Walkthrough

Simple from CyberSecLabs is a beginner Linux box hosting a CMS Made Simple website. We’ll gain access to the target through a SQLi attack to find creds and then get a reverse shell through the admin web console. Finally we’ll use a binary with the SUID bit set to escalate our privileges to root. Let’s…

CyberSecLabs “Outdated” Walkthrough

Outdated is a beginner level box from CyberSecLabs hosting an NFS share and an outdated version of FTP. After using built-in ProFTP commands to copy files we’ll get our first shell. From there we enumerate the kernel and find an exploit. Outdated’s IP Address is 172.31.1.22. Fire up the VPN, let’s get started. Scanning and…

CyberSecLabs – “CMS” Walkthrough

CMS from CyberSecLabs is a beginner level box hosting a WordPress installation. Using a file inclusion vulnerability we’ll gain access to the target, and exploit weak sudo permissions to escalate to root. Let’s get started. The IP Address for CMS is 172.31.1.8 Scanning and Enumeration As always we run our Nmap scan against the target…

CyberSecLabs – “Shares” Walkthrough

Shares from CyberSecLabs is a interesting beginner box in that there’s very little actual exploitation. No reverse shells, no payloads and we also won’t be using any automated tools for enumeration during privilege escalation. What we will be doing is taking advantage of a open share containing a user’s home directory with everything that entails.…

CyberSecLabs – “Unroot” Walkthrough

Unroot from CyberSecLabs is a beginner Linux box hosting a web server with a hidden ping-test page which we’ll exploit to get our initial low priv shell. For privilege escalation we will use a very simple Sudo exploit to get root. Let’s get started. Unroot’s IP Address is 172.31.1.17. Connect to the VPN and ping…

CyberSecLabs – “Weak” Walkthrough

Weak from CyberSecLabs is a beginner box hosting a FTP file share and Mircorosft IIS web server . We’ll use Nmap and Nikto to enumerate and find a foothold. For privilege escalation we will discover a common Windows privesc path manually without using automated tools like winPEAS. Weak’s IP Address is 172.31.1.11 Let’s get started.…

CyberSecLabs – “Deployable” Walkthrough

Deployable from CyberSecLabs is a beginner level box where we’ll explore a default Apache Tomcat installation for initial access. Then use winPEAS to enumerate the box and find the privilege escalation path by exploiting a vulnerable Windows service. Let’s get started. Deployable’s IP address is 172.31.1.13. Scanning and Enumeration As per usual we start with…

CyberSecLabs – “Shock” Walkthrough

Shock from CyberSecLabs is a beginner Linux box hosting a Apache web server. We’ll use Nikto to discover a Bash vulnerability that we can use to get a shell. To complete the box we’ll use some basic Linux privesc techniques to escalate to root. The IP address for Shock is 172.31.1.3. Scanning and Enumeration I…

Loading…

Something went wrong. Please refresh the page and/or try again.


Follow My Blog

Get new content delivered directly to your inbox.

%d bloggers like this: