Skip to main content
July-2024 Updates - New Exclusive Content
Diablo avatar
Written by Diablo
Updated over a week ago

We’ve introduced three new exclusive machines, and four training machines to Dedicated Labs.


NEW EXCLUSIVE MACHINES

DetectorTwo

Difficulty

Medium - Penetration Testing Level 2

Areas of Interest

Endpoint Detection and Response (EDR) Bypasses, Reverse Engineering, Windows Internals

Technologies

C#

Skills

Enumeration, Basic Windows knowledge, Basic EDR knowledge, C# Knowledge, Reverse Engineering

Llama

Difficulty

Easy - Penetration Tester Level 1

Areas of Interest

Ollama (CVE-2024-37032) & Sonatype Nexus Repository (CVE-2024-4956) CVE Exploitation

Technologies

Nexus Repository, Ollama

Skills

CVE Exploitation

Polygonal

Difficulty

Easy - Penetration Tester Level 1

Areas of Interest

Polyfill Supply Chain Attack, DNS Hijacking, Javascript Execution

Technologies

Nginx, Unbound

Skills

Enumeration, HTML, JavaScript, Networking


NEW TRAINING MACHINES

The retired community machines from 20th June to 20th July are detailed below.

Office

  • A hard-difficulty Windows Machine featuring various vulnerabilities including Joomla web application abuse, PCAP analysis to identify Kerberos credentials, abusing LibreOffice macros after disabling the MacroSecurityLevel registry value, abusing MSKRP to dump DPAPI credentials, and abusing Group Policies due to excessive Active Directory privileges.

Jab

  • A medium-difficulty Windows Machine that features an Openfire XMPP server, hosted on a Domain Controller (DC). Public registration on the XMPP server allows the user to register an account. Then, by retrieving a list of all the users on the domain, a kerberoastable account is found, which allows the attacker to crack the retrieved hash for the user's password. By visiting the account's XMPP chat rooms, another account's password is retrieved. This new account has DCOM privileges over the DC, thus granting the attacker local access on the machine. Finally, a malicious plugin uploaded through the locally-hosted Openfire Administration Panel gives the user SYSTEM access.

Corporate

  • An insane-difficulty Linux Machine featuring a feature-rich web attack surface that requires chaining various vulnerabilities to bypass strict Content Security Policies (CSP) and steal an authentication cookie via Cross-Site Scripting (XSS). This results in staff-level access to internal web applications, from where a file-sharing service's access controls can be bypassed to access other users' files. This leads to an onboarding document revealing the default password template. Password spraying the SSO endpoint returns valid credentials, which can be used to SSH into a workstation that authenticates via LDAP. Data in the user's home directory can be used to brute force the pin to a Bitwarden vault, enabling the attacker to pass multi-factor authentication (MFA) on Gitea and enumerate private repositories, discovering a private key used to sign JWT tokens. Forging a token and authenticating as a user in the engineering group, the LDAP password is changed to obtain system access to the group and a docker socket, which is leveraged to obtain root privileges inside a Proxmox environment. The container is escaped using a private SSH key belonging to the sysadmin group. Finally, CVE-2022-35508 is used to exploit PVE and obtain access to the root account on the host machine.

Headless

  • An easy-difficulty Linux Machine that features a Python Werkzeug server hosting a website. The website has a customer support form, which is found to be vulnerable to blind Cross-Site Scripting (XSS) via the User-Agent header. This vulnerability is leveraged to steal an admin cookie, which is then used to access the administrator dashboard. The page is vulnerable to command injection, leading to a reverse shell on the box. Enumerating the user’s mail reveals a script that does not use absolute paths, which is leveraged to get a shell as root.


Looking for more content, features, or a place to leave feedback?

Book your spot for a 15-minute call where we can discuss how to level up your training!

Did this answer your question?