Difficulty
intermediate
Average duration
2 hrs
Technologies
cybersecurity
penetration testing
sql-injection
ssh
privilege-escalation
Difficulty
intermediate
Average duration
2 hrs
Technologies
cybersecurity
penetration testing
sql-injection
ssh
privilege-escalation
In this third phase of the pentest on the vulnerable machine The Lovers, you will move from enumeration to practical exploitation. Your goal is to leverage the information gathered in previous phases to gain access to the system, explore its resources, and escalate privileges until you achieve full control.
Analyze the login form
Obtain useful credentials
Access the target machine
Explore the system
Investigate your findings
Escalate privileges
In this project, your only official submission on the platform will be the flags you find.
⚠️ Important! Although you only need to submit the flags, you must carefully document the entire exploitation process.
These notes are not submitted now, but will be required in the next module, where you must prepare your vulnerability report and mitigation based on what you documented during this exercise.
Difficulty
intermediate
Average duration
2 hrs
Technologies
cybersecurity
penetration testing
sql-injection
ssh
privilege-escalation
Difficulty
intermediate
Average duration
2 hrs
Technologies
cybersecurity
penetration testing
sql-injection
ssh
privilege-escalation
Difficulty
intermediate
Average duration
2 hrs
Technologies
cybersecurity
penetration testing
sql-injection
ssh
privilege-escalation
Difficulty
intermediate
Average duration
2 hrs
Technologies
cybersecurity
penetration testing
sql-injection
ssh
privilege-escalation
Difficulty
intermediate
Average duration
2 hrs
Technologies
cybersecurity
penetration testing
sql-injection
ssh
privilege-escalation
Difficulty
intermediate
Average duration
2 hrs
Technologies
cybersecurity
penetration testing
sql-injection
ssh
privilege-escalation