Difficulty
intermediate
Average duration
2 hrs
Technologies
owasp-a05-security-misconfiguration
ssh
red team
owasp-a01-broken-access-control
web
cybersecurity
linux
Difficulty
intermediate
Average duration
2 hrs
Technologies
owasp-a05-security-misconfiguration
ssh
red team
owasp-a01-broken-access-control
web
cybersecurity
linux
In this capture the flag lab, you will analyze a seemingly simple web page, discover improperly leaked credentials, and access a system via SSH to retrieve a flag. In this lab, you will learn:
Follow these instructions to get started:
You are facing the website of an internet and telephony service company called TELEFONIKA. Your task is to analyze how the page is built and discover if there are any exploitable vulnerabilities.
Discover the IP address of the TELEFONIKA machine.
nmap
, netdiscover
, or arp-scan
to scan the network.Access the website hosted on the server.
Inspect the source code.
Use the information found to connect via SSH.
Find the flag.
Happy hacking!
Difficulty
intermediate
Average duration
2 hrs
Technologies
owasp-a05-security-misconfiguration
ssh
red team
owasp-a01-broken-access-control
web
cybersecurity
linux
Difficulty
intermediate
Average duration
2 hrs
Technologies
owasp-a05-security-misconfiguration
ssh
red team
owasp-a01-broken-access-control
web
cybersecurity
linux
Difficulty
intermediate
Average duration
2 hrs
Technologies
owasp-a05-security-misconfiguration
ssh
red team
owasp-a01-broken-access-control
web
cybersecurity
linux
Difficulty
intermediate
Average duration
2 hrs
Technologies
owasp-a05-security-misconfiguration
ssh
red team
owasp-a01-broken-access-control
web
cybersecurity
linux
Difficulty
intermediate
Average duration
2 hrs
Technologies
owasp-a05-security-misconfiguration
ssh
red team
owasp-a01-broken-access-control
web
cybersecurity
linux
Difficulty
intermediate
Average duration
2 hrs
Technologies
owasp-a05-security-misconfiguration
ssh
red team
owasp-a01-broken-access-control
web
cybersecurity
linux