July 2024

PG - Plum

PG – Plum

In this walk through, we will be going through the Plum room from Proving Grounds. This room is rated as Intermediate on the platform and it consists of exploitation of PluXml via CVE-2022-25018 to get initial foothold. For Privilege escalation, root password stored in SMTP related files have to be exposed to get root on […]

PG – Plum Read More »

PG - Pelican

PG – Pelican

In this walk through, we will be going through the Pelican room from Proving Grounds. This room is rated as Intermediate on the platform and it consist of exploitation of Exhibitor for Zookeeper using CVE-2019-5029 to get the initial access. For the privilege escalation, abuse of the gcore binary sudo misconfiguration is required to get

PG – Pelican Read More »

PG - Pc

PG – Pc

In this walk through, we will be going through the Pc room from Proving Grounds. This room is rated as Intermediate on the platform and it consists of getting initial access by accessing a browser terminal on port 8000 and for privilege escalation, exploitation of rpc.py via CVE-2022-35411 is required to get root on the

PG – Pc Read More »

PG - Monitoring

PG – Monitoring

In this walk through, we will be going through the Law room from Proving Grounds. This room is rated as Intermediate on the platform and it consist of exploitation of Nagios XI installation using default credentials and a known authenticated RCE exploit. So, let’s get started without any delay. Machine Info: Title Monitoring IPaddress 192.168.225.136

PG – Monitoring Read More »

PG - Marshalled

PG – Marshalled

In this walk through, we will be going through the Marshalled room from Proving Grounds. This room is rated as Intermediate on the platform and it consist of exploitation of a Blind RCE through YAML Deserilization in Ruby on Rails framework for the initial access and a buffer overflow in cname binary for the Privilege

PG – Marshalled Read More »

PG - Law

PG – Law

In this walk through, we will be going through the Law room from Proving Grounds. This room is rated as Intermediate on the platform and it consist of exploitation of CVE-2022-35914 in HTMLawed 1.2.5 to get the initial access. For Privilege escalation, abuse of a cron job via a bash script file is required to

PG – Law Read More »

PG - Kevin

PG – Kevin

In this walk through, we will be going through the Kevin room from Proving Grounds. This room is rated as Easy on the platform and it consists of exploitation of CVE-2009-2685 which is a stack based buffer overflow vulnerability that leads to RCE on the system. So, let’s get started without any delay. Machine Info:

PG – Kevin Read More »

PG - Jacko

PG – Jacko

In this walk through, we will be going through the Jacko room from Proving Grounds. This room is rated as Intermediate on the platform and it consist of exploitation of running H2 Database instance via JNI Code Execution. For privilege escalation, we have two routes, either exploit PaperStream IP particular version or use Potato Exploits

PG – Jacko Read More »

PG - Internal

PG – Internal

In this walk through, we will be going through the Internal room from Proving Grounds. This room is rated as Easy on the platform and it consists of exploitation of MS17-010 (Eternal Blue) vulnerability to get root on the system. So, let’s get started without any delay. Machine Info: Title Internal IPaddress 192.168.166.40 Difficulty Easy

PG – Internal Read More »

Scroll to Top