Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
penetration testing
red team
Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
penetration testing
red team
A server is exposing one of its services in an improper manner. During a preliminary assessment, signs of unauthenticated access and potential vulnerabilities related to credential management have been detected.
Identify entry points that do not require authentication or rely on weak security practices. Investigate the system, gain legitimate access to a user account, and determine whether it's possible to escalate privileges to reach restricted areas.
Follow these instructions to get started:
1 https://storage.googleapis.com/cybersecurity-machines/ftp-4geeks-lab.ova
ftp
)hydra
rockyou.txt
(available in many security distributions)Remember: there are no magic solutions. Observe, reason, and use the appropriate tools. Knowledge is your best ally.
Happy Hacking!
Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
penetration testing
red team
Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
penetration testing
red team
Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
penetration testing
red team
Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
penetration testing
red team
Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
penetration testing
red team
Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
penetration testing
red team