Skip to main content
January-2025 Updates - New Exclusive Content
Diablo avatar
Written by Diablo
Updated this week

We’ve introduced three new exclusive machines and five training machines to Dedicated Labs.


NEW EXCLUSIVE MACHINES

GoneFishing

Difficulty

Medium - Penetration Testing Level 2

Areas of Interest

Phishing

Technologies

WordPress, XAMPP

Languages

Powershell

Skills

Enumeration, Basic Windows Knowledge

Deputy

Difficulty

Medium - Penetration Tester Level 2

Areas of Interest

Cloud

Technologies

Apache, Localstack, Terraform

Languages

Python

Skills

Enumeration, Basic Cloud Knowledge

SweetCRM

Difficulty

Medium - Penetration Tester Level 1

Areas of Interest

Finance, CVE

Technologies

SuiteCRM

Languages

PHP, Python

Skills

Enumeration, Basic Web Knowledge, Basic Python Knowledge


NEW TRAINING MACHINES

The retired community machines from 20th October to 20th November are detailed below.

MonitorsThree

  • A Medium Difficulty Linux Machine that features a website for a company offering networking solutions. The website has a forgotten password page vulnerable to SQL injection, which is leveraged to gain access to credentials. Further enumeration of the website reveals a subdomain featuring a Cacti instance that can be accessed with the credentials obtained from the SQL injection. The Cacti instance is vulnerable to CVE-2024-25641, which is leveraged to gain a foothold on the system. Further enumeration of the system reveals credentials used to access the database, where hashes are found and cracked to obtain the user password. This is then used to gain access to SSH private keys, leading to SSH access to the system. Enumeration of open ports on the system reveals a vulnerable Duplicatiinstance, which is leveraged to gain a shell as root.

Sightless

  • An easy-difficulty Linux Machine featuring a website for a company offering various services. Enumeration of the website reveals an SQLPad instance vulnerable to template injection CVE-2022-0944, which is leveraged to gain a foothold inside a Docker container. Further enumeration reveals the /etc/shadow file with a password hash, which is cracked to reveal the password, granting SSH access to the host. Post-exploitation enumeration reveals a Froxlor instance vulnerable to Blind XSS CVE-2024-34070. This is leveraged to gain access to the FTP service, which contains a KeePass database. Accessing the database reveals the root SSH keys, leading to a privileged shell on the host.

Sea

  • An Easy Difficulty Linux Machine that features CVE-2023-41425 in WonderCMS, a cross-site scripting (XSS) vulnerability that can be used to upload a malicious module, allowing access to the system. The privilege escalation features extracting and cracking a password from WonderCMS's database file, then exploiting a command injection in custom-built system monitoring software, giving us root access.

Caption

  • A Hard-difficulty Linux Machine, showcasing the chaining of niche vulnerabilities arising from different technologies such as HAProxy and Varnish. It begins with default credentials granting access to GitBucket, which exposes credentials for a web portal login through commits. The application caches a frequently visited page by an admin user, whose session can be hijacked by exploiting Web Cache Deception (WCD) via response poisoning exploited through a Cross-Site Scripting (XSS) payload. HAProxy controls can be bypassed by establishing an HTTP/2 cleartext tunnel, also known as an H2C Smuggling Attack, enabling the exploitation of a locally running service vulnerable to path traversal (CVE-2023-37474). A foothold is gained by reading the SSH ECDSA private key. Root privileges are obtained by exploiting a command injection vulnerability in the Apache Thrift service running as root.

Strutted

  • A medium-difficulty Linux Machine featuring a website for a company offering image hosting solutions. The website provides a Docker container with the version of Apache Struts that is vulnerable to CVE-2024-53677, which is leveraged to gain a foothold on the system. Further enumeration reveals the tomcat-users.xml file with a plaintext password used to authenticate as James. For privilege escalation, we abuse tcpdump while being used with sudo to create a copy of the bash binary with the SUID bit set, allowing us to gain a root shell.


Looking for more content, features, or a place to leave feedback?

Book your spot for a 15-minute call where we can discuss how to level up your training!



Did this answer your question?