lin.security_v1.0
Beschreibung
Here at in.security we wanted to develop a Linux virtual machine that is based, at the time of writing, on an up-to-date Ubuntu distro (18.04 LTS), but suffers from a number of vulnerabilities that allow a user to escalate to root on the box. This has been designed to help understand how certain built-in applications and services if misconfigured, may be abused by an attacker.
We have configured the box to simulate real-world vulnerabilities (albeit on a single host) which will help you to perfect your local privilege escalation skills, techniques and toolsets. There are a number challenges which range from fairly easy to intermediate level and we’re excited to see the methods you use to solve them!
To get started you can log onto the host with the credentials: bob/secret
Zeit der Kompromittierung
4 Stunden
Betriebssystem
linux
diese virtuelle Umgebung startenErgebnisse des CTF alltheday für lin.security_v1.0
Nickname | Virtual Machine | Anzahl der Angreifer | Begonnen am | Maschine kompromittiert in |
- | lin.security_v1.0 | 0 | 30. November 2018 zu 09:53 | - |