Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
red team
web
owasp-a05-security-misconfiguration
ssh
owasp-a01-broken-access-control
Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
red team
web
owasp-a05-security-misconfiguration
ssh
owasp-a01-broken-access-control
In this capture the flag lab, you will analyze a seemingly simple web page, discover improperly leaked credentials, and access a system via SSH to retrieve a flag. In this lab, you will learn:
Follow these instructions to get started:
You are facing the website of an internet and telephony service company called TELEFONIKA. Your task is to analyze how the page is built and discover if there are any exploitable vulnerabilities.
Discover the IP address of the TELEFONIKA machine.
nmap
, netdiscover
, or arp-scan
to scan the network.Access the website hosted on the server.
Inspect the source code.
Use the information found to connect via SSH.
Find the flag.
Happy hacking!
Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
red team
web
owasp-a05-security-misconfiguration
ssh
owasp-a01-broken-access-control
Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
red team
web
owasp-a05-security-misconfiguration
ssh
owasp-a01-broken-access-control
Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
red team
web
owasp-a05-security-misconfiguration
ssh
owasp-a01-broken-access-control
Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
red team
web
owasp-a05-security-misconfiguration
ssh
owasp-a01-broken-access-control
Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
red team
web
owasp-a05-security-misconfiguration
ssh
owasp-a01-broken-access-control
Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
red team
web
owasp-a05-security-misconfiguration
ssh
owasp-a01-broken-access-control