Difficulty
intermediate
Average duration
2 hrs
Technologies
read-team
apache
web
md5
linux
cybersecurity
broken-access-control
Difficulty
intermediate
Average duration
2 hrs
Technologies
read-team
apache
web
md5
linux
cybersecurity
broken-access-control
A hosting, domain, and VPS service company has published a web application with supposedly secure measures. However, there are signs that some sections of the system may be improperly exposed and could contain sensitive credentials.
Your mission is to identify whether there are uncontrolled entry points, analyze potential access flaws, and determine if it's possible to simulate the behavior of legitimate users based on the exposed information.
Follow these instructions to get started:
1 https://storage.googleapis.com/cybersecurity-machines/customer-service-lab.ova
While the approach is up to you, you may consider using the following tools during your investigation:
Remember: systems do not always fail due to complex issues. Sometimes, it is enough to bypass a basic access control.
Good luck!
Difficulty
intermediate
Average duration
2 hrs
Technologies
read-team
apache
web
md5
linux
cybersecurity
broken-access-control
Difficulty
intermediate
Average duration
2 hrs
Technologies
read-team
apache
web
md5
linux
cybersecurity
broken-access-control
Difficulty
intermediate
Average duration
2 hrs
Technologies
read-team
apache
web
md5
linux
cybersecurity
broken-access-control
Difficulty
intermediate
Average duration
2 hrs
Technologies
read-team
apache
web
md5
linux
cybersecurity
broken-access-control
Difficulty
intermediate
Average duration
2 hrs
Technologies
read-team
apache
web
md5
linux
cybersecurity
broken-access-control
Difficulty
intermediate
Average duration
2 hrs
Technologies
read-team
apache
web
md5
linux
cybersecurity
broken-access-control