Data
HackTheBox machine featuring Grafana path traversal vulnerability and Docker privilege escalation
1153 words
|
6 minutes
Cover Image of the Post
Sendai
VulnLab Windows Active Directory machine featuring weak password policies and certificate template hijacking
4941 words
|
25 minutes
Cover Image of the Post
VulnCicada
VulnLab Windows Active Directory machine demonstrating NFS misconfigurations and credential exposure
2379 words
|
12 minutes
Cover Image of the Post
TheFrizz
Hack The Box Windows machine, medium difficulty
886 words
|
4 minutes
Cover Image of the Post
Checker
Hack The Box linux machine, hard difficulty
1207 words
|
6 minutes
Cover Image of the Post
Cypher
Hack The Box linux machine, medium difficulty
1306 words
|
7 minutes
Cover Image of the Post
Dog
Hack The Box linux machine, easy difficulty
574 words
|
3 minutes
Cover Image of the Post
Takedown
We’ve identified an unusual pattern in our network activity, indicating a possible security breach. Our team suspects an unauthorized intrusion into our systems, potentially compromising sensitive data. Your task is to investigate this incident.
54 words
|
1 minute
1
2