We’ve introduced two new exclusive and four training Machines and two exclusive Sherlocks to Dedicated Labs.
NEW EXCLUSIVE MACHINES
CityOfRock:
Difficulty | Very Easy - Penetration Testing Level 1 |
Areas of Interest | CVE |
Technologies | JetBrains, TeamCity |
Languages | JAVA |
Skills | Enumeration, Unix command usage |
CVSS Score | 9.8 (Critical) |
Borealis:
Difficulty | Easy - Penetration Tester Level 1 |
Areas of Interest | EDR |
Technologies | Windows |
Languages | C |
Skills | Enumeration, Basic Windows knowledge, Basic EDR knowledge |
NEW TRAINING MACHINES
The retired community machines from 20th January to 20th February are detailed below.
Visual
a Medium Windows Machine featuring a web service that accepts user-submitted .NET 6.0 project repositories, building and returning the executables
CozyHosting
An easy-difficulty Linux Machine that features a Spring Boot application. The application has the Actuator endpoint enabled.
Appsanity
A hard-difficulty Windows Machine focused on application misconfigurations both on the web and locally.
Manager
A medium-difficulty Windows Machine that hosts an Active Directory environment with AD CS (Active Directory Certificate Services), a web server, and an SQL server.
Exclusive Sherlocks
Carson
Difficulty | Easy |
Category | Harden |
Technology | Linux, Webutler |
As a digital forensics investigator, you receive a distress call from a client who operates a website using the WeButler software suite. The client reports that they are unable to log into the web interface to make modifications to their website. Concerned about a potential security breach, they seek your expertise to investigate the issue and restore access to their system.
MonikerD
Difficulty | Very Easy |
Category | DFIR |
Technology | Windows, Microsoft Outlook |
In the bustling metropolis of NeoCity, Damian, a diligent IT specialist, finds himself at the heart of a cunning cyberattack when a shadowy hacker sends him a seemingly innocuous email, leading him to inadvertently click a disguised link, granting access to his system and allowing the attacker to extract valuable NTLM hashes. Unaware of the impending threat, Damian continues his tasks until he notices anomalies within his network, prompting him to spring into action, initiating emergency protocols to contain the breach and fortify his defenses. It is your job to investigate this incident,identify the attack path that the attacker has used, and help Damian carry on with business as normal.
Looking for more content, features, or a place to leave feedback?
Book your spot for a 15-minute call where we can discuss how to level up your training!