Difficulty
intermediate
Average duration
2 hrs
Technologies
owasp-a05-security-misconfiguration
ssh
red team
cybersecurity
owasp-a01-broken-access-control
web
linux
Difficulty
intermediate
Average duration
2 hrs
Technologies
owasp-a05-security-misconfiguration
ssh
red team
cybersecurity
owasp-a01-broken-access-control
web
linux
A company named TELEFONIKA, which provides internet and telephone services, has published a website accessible from the internal network. During a recent review, concerns were raised that it might be exposing more information than intended. Your mission is to analyze the system and determine whether internal access can be obtained through the publicly available resources.
Follow these instructions to get started:
1 https://storage.googleapis.com/cybersecurity-machines/telefonika-lab.ova
Happy hacking!
Difficulty
intermediate
Average duration
2 hrs
Technologies
owasp-a05-security-misconfiguration
ssh
red team
cybersecurity
owasp-a01-broken-access-control
web
linux
Difficulty
intermediate
Average duration
2 hrs
Technologies
owasp-a05-security-misconfiguration
ssh
red team
cybersecurity
owasp-a01-broken-access-control
web
linux
Difficulty
intermediate
Average duration
2 hrs
Technologies
owasp-a05-security-misconfiguration
ssh
red team
cybersecurity
owasp-a01-broken-access-control
web
linux
Difficulty
intermediate
Average duration
2 hrs
Technologies
owasp-a05-security-misconfiguration
ssh
red team
cybersecurity
owasp-a01-broken-access-control
web
linux
Difficulty
intermediate
Average duration
2 hrs
Technologies
owasp-a05-security-misconfiguration
ssh
red team
cybersecurity
owasp-a01-broken-access-control
web
linux
Difficulty
intermediate
Average duration
2 hrs
Technologies
owasp-a05-security-misconfiguration
ssh
red team
cybersecurity
owasp-a01-broken-access-control
web
linux