Start interactive tutorial

← Back to Projects

Telefonika - CTF machine for vulnerability exposed Code Analysis

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

  • owasp-a05-security-misconfiguration

  • ssh

  • red team

    cybersecurity

  • owasp-a01-broken-access-control

  • web

  • linux

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

🌱 How to Start This Lab

A company named TELEFONIKA, which provides internet and telephone services, has published a website accessible from the internal network. During a recent review, concerns were raised that it might be exposing more information than intended. Your mission is to analyze the system and determine whether internal access can be obtained through the publicly available resources.

  • Examine how the system presents information through its web interface.
  • Determine whether the development practices have left behind traces that could be exploited.
  • If you're able to interact with the system beyond what is visible, locate the requested evidence.

🌱 How to Start This Lab

Follow these instructions to get started:

  1. Download the virtual machine from this link:
We are sorry, you don't have enough privileges to access this block of content, please signup or upgrade your plan to access it.
1 https://storage.googleapis.com/cybersecurity-machines/telefonika-lab.ova
  1. Import the machine into your preferred virtualization software (VirtualBox, VMware, etc.).
  2. Start the VM and begin the challenge.

Remember: sometimes the keys are not hidden... just poorly placed.

Happy hacking!

Sign up and get access to solution files and videos for free

We will use it to give you access to your account.
Already have an account? Login here.

By signing up, you agree to the Terms and conditions and Privacy policy.

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

Sign up and get access to solution files and videos for free

We will use it to give you access to your account.
Already have an account? Login here.

By signing up, you agree to the Terms and conditions and Privacy policy.

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

Difficulty

  • intermediate

Average duration

2 hrs

Technologies