Start interactive tutorial

← Back to Projects

The lovers - SQL injection y and escalate privileges

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

  • linux

  • cybersecurity

    red team

  • sql-injection

  • ssh

  • hashcat

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

🌱 How to start this lab

In this lab, you will analyze a dating web application that might be exposing more than it seems. Through its features, you'll investigate internal access points, uncover hidden secrets, and potentially reach areas of the system reserved for privileged users.

During this challenge, you will put your skills to the test in:

  • Web application analysis and identification of entry points
  • Evaluation of insecure authentication practices
  • Investigation of users, files, and relationships within the system
  • Remote access and post-compromise analysis on Linux systems

🌱 How to start this lab

Follow these instructions to get started:

  1. Download the virtual machine from this link:
We are sorry, you don't have enough privileges to access this block of content, please signup or upgrade your plan to access it.
1 https://storage.googleapis.com/cybersecurity-machines/lovers-lab.ova
  1. Import the machine into your preferred virtualization software (VirtualBox, VMware, etc.).
  2. Start the VM and begin the challenge.

Remember: even secret loves leave digital traces. 💔

Good luck!

Sign up and get access to solution files and videos for free

We will use it to give you access to your account.
Already have an account? Login here.

By signing up, you agree to the Terms and conditions and Privacy policy.

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

Sign up and get access to solution files and videos for free

We will use it to give you access to your account.
Already have an account? Login here.

By signing up, you agree to the Terms and conditions and Privacy policy.

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

Difficulty

  • intermediate

Average duration

2 hrs

Technologies