Skip to main content
September-2023 Updates - New Exclusive & Training Machines
Diablo avatar
Written by Diablo
Updated over 5 months ago

We’ve introduced two new exclusive and four training machines to Dedicated Labs.


NEW EXCLUSIVE MACHINES

Referrals

Difficulty

Easy - Penetration Tester Level 1

Areas of Interest

Systems, Software & Web Applications

Technologies

Windows, WinRAR, Jorani Leave Management System

Languages

Python, Ruby

Skills

CVE Exploitation

NEW EXCLUSIVE CHALLENGES

Studiorum (Artificial Intelligence)

Difficulty

Easy - Penetration Tester Level 2

Areas of Interest

Artificial Intelligence

Technologies

OpenAI

Languages

Python

Skills

Prompt Injection


NEW TRAINING MACHINES

The retired community machines from 20th August to 20th September are detailed below.

  • OnlyForYou

    • A Medium Difficulty Linux machine that features a web application susceptible to a Local File Inclusion (LFI), which is used to access source code that reveals a Blind Command Injection vulnerability, leading to a shell on the target system.

  • MonitorsTwo

    • An Easy Difficulty Linux machine showcasing a variety of vulnerabilities and misconfigurations. Initial enumeration exposes a web application prone to pre-authentication Remote Code Execution (RCE) through a malicious X-Forwarded-For header.

  • PikaTwoo

    • An insane difficulty Linux machine that features an assortment of vulnerabilities and misconfigurations. By enumerating the ports and endpoints on the machine, a downloadable Android app can be found that is susceptible to a Man-in-the-Middle (MITM) attack by reversing and modifying some of the bytecode of the Flutter app, bypassing the certificate pinning protection mechanism.

  • Wifinetic

    • An easy difficulty Linux machine which presents an intriguing network challenge, focusing on wireless security and network monitoring.


Looking for more content, features, or a place to leave feedback?

Book your spot for a 15-minute call where we can discuss how to level up your training!

Did this answer your question?