Difficulty
intermediate
Average duration
2 hrs
Technologies
suid
cybersecurity
linux
owasp-a05-security-misconfiguration
ssh
red team
owasp-a07-identification-authentication-failures
hydra
Difficulty
intermediate
Average duration
2 hrs
Technologies
suid
cybersecurity
linux
owasp-a05-security-misconfiguration
ssh
red team
owasp-a07-identification-authentication-failures
hydra
In this lab, you will explore a corporate Linux system where multiple users operate with different levels of privileges. It is suspected that one of them may have the ability to escalate and gain full control over the system.
Your mission is to identify weaknesses in the existing accounts, evaluate the files accessible from the initial environment, and find a path to the account with the highest level of privileges.
Follow these instructions to get started:
1 https://storage.googleapis.com/cybersecurity-machines/elevation-lab.ova
student:4geeks-lab
.During your analysis, you may consider using:
Remember: sometimes power lies not in what is visible… but in what seems unprotected.
Happy hacking!
Difficulty
intermediate
Average duration
2 hrs
Technologies
suid
cybersecurity
linux
owasp-a05-security-misconfiguration
ssh
red team
owasp-a07-identification-authentication-failures
hydra
Difficulty
intermediate
Average duration
2 hrs
Technologies
suid
cybersecurity
linux
owasp-a05-security-misconfiguration
ssh
red team
owasp-a07-identification-authentication-failures
hydra
Difficulty
intermediate
Average duration
2 hrs
Technologies
suid
cybersecurity
linux
owasp-a05-security-misconfiguration
ssh
red team
owasp-a07-identification-authentication-failures
hydra
Difficulty
intermediate
Average duration
2 hrs
Technologies
suid
cybersecurity
linux
owasp-a05-security-misconfiguration
ssh
red team
owasp-a07-identification-authentication-failures
hydra
Difficulty
intermediate
Average duration
2 hrs
Technologies
suid
cybersecurity
linux
owasp-a05-security-misconfiguration
ssh
red team
owasp-a07-identification-authentication-failures
hydra
Difficulty
intermediate
Average duration
2 hrs
Technologies
suid
cybersecurity
linux
owasp-a05-security-misconfiguration
ssh
red team
owasp-a07-identification-authentication-failures
hydra