Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
red team
sql-injection
ssh
hashcat
Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
red team
sql-injection
ssh
hashcat
In this lab, you will analyze a dating web application that might be exposing more than it seems. Through its features, you'll investigate internal access points, uncover hidden secrets, and potentially reach areas of the system reserved for privileged users.
During this challenge, you will put your skills to the test in:
Follow these instructions to get started:
1 https://storage.googleapis.com/cybersecurity-machines/lovers-lab.ova
Remember: even secret loves leave digital traces. 💔
Good luck!
Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
red team
sql-injection
ssh
hashcat
Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
red team
sql-injection
ssh
hashcat
Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
red team
sql-injection
ssh
hashcat
Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
red team
sql-injection
ssh
hashcat
Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
red team
sql-injection
ssh
hashcat
Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
red team
sql-injection
ssh
hashcat