Symfonos 1 |
- SMB Fileshare Bruteforce
- Wordpress (Plugin Exploit LFI)
- SUID Binary (Path Hijacking)
|
Symfonos 2 |
- SMB + FTP Exploit
- CMS Exploit (RCE)
- Sudo (GTFO Bin)
|
Symfonos 3 |
- Hidden Dir (/underworld)
- Shellshock
- Cronjob + TCPDump
- Cronjob + Python Hijacking
|
Symfonos 4 |
- Compile exploits to root
|
Symfonos 5.2 |
- Compile exploits to root
|
Kioptrix - L1 |
- Compile exploits to root
|
Kioptrix - L2 |
- SQLi Auth Bypass
- Command Injection
- Kernel Exploit
|
Kioptrix - L3 |
- CMS Exploit
- Creds Found in Linux
- Buffer Overflow/Sudo/Kernel Exploit/
|
Kioptrix - L4 |
- SQLi Auth Bypass
- Escape Jail Shell
- SQL running as Root
|
Kioptrix - L5 |
- CMS Exploit (LFI)
- CMS Exploit (RCE)
- Kernel Exploit
|
DC 6 |
- Wordpress (Plugin)
- Creds Found in Linux
- Sudo
- Sudo
|
DC 9 |
- SQLi Database Enum
- Bruteforce HTTP Form
- LFI
- Port Knocking
- Bruteforce SSH
- Sudo
|
Troll 1 |
- FTP anon
- Wireshark
- Bruteforce SSH
- Cronjob/Kernel Exploit
|
Troll 2 |
- FTP w/ Obvious Creds
- Image Forensics
- Bruteforce Zip
- SSH + Jailshell
- 32 Bit Buffer Overflow
|
Troll 3 |
- FTP w/ Obvious Creds
- Image Forensics
- Bruteforce Zip
- SSH + Jailshell
- 32 Bit Buffer Overflow
|
PwnOSv2 |
- SQLi Insert Webshell/CMS Exploit
- Creds Found in Linux
|
PwnLab |
- LFI
- File Upload + Bypass
- SUID Binary (Path Hijacking)
- SUID Binary (Command Injection)
|
SickOS |
- HTTP PUT
- Vulnerable Binary
|
Temple Of Doom |
- Web App Exploit
- Vulnerable Binary
- Sudo (GTFO Bin)
|
Vulnix |
- SMTP Username Enum
- SSH Bruteforce
- NFS Fileshare
- no_root_squash
|
Web Developer |
- Wireshark
- Wordpress (Upload Reverse Shell)
- Creds Found in Linux
- Sudo (GTFO Bin)
|
Zico2 |
- CMS Exploit
- Creds Found in Linux
- Creds Found in Linux
- Sudo (GTFO Bin)
|
SkyTower |
- SQLi Auth Bypass + WAF Bypass
- Proxychains (Open up SSH)
- Creds Found in Linux
- Sudo
|
Fristileaks |
- Hidden Dir (/fristi)
- HTML Hidden Text
- File Upload + Bypass
- Cronjob
- Reverse Engineering Password
- Sudo
|
LinSecurity |
- NFS Fileshare
- Sudo (GTFO Bin)/SUID Binary (GTFO Bin)/Docker/systemd
|
PinkysPalacev2 |
- Hidden Dir (/secret)
- Port Knocking
- Bruteforce (cewl wordlist)
- Bruteforce SSH key
- SUID Binary
- Cronjob
- 64 Bit Buffer Overflow
|
Solid State 1 |
- Service Exploit
- Cronjob
|
Escalate_Linux |
- Enumerate Users (SMB)
- HTTP RCE
- no_root_squash/SUID Binary (Path Hijacking)/SUID Binary
|
Wintermute |
- Hidden Dir (/turing-bolo)
- LFI
- SUID Binary
- Pivot
- CMS Exploit
- LXD/Kernel Exploit
|
Born2Root |
- Hidden Dir (/icons)
- Cronjob
- Bruteforce SSH
- Reused Creds
|
Stapler1 |
- Wordpress (Plugin)/(Bruteforce)/ Bruteforce FTP
- Creds Found in Linux/Cronjob/Kernel Exploit
|
Digitalworld.local(Bravery) |
- Enumerate Users (SMB)
- Create Wordlist
- Bruteforce SMB Fileshare
- HTTP Dir Enum
- CMS Exploit
- no_root_squash/Cronjob/SUID Binary (GTFO Bin)
|
Digitalworld.local(Development)-notdone |
|
Digitalworld.local(FALL)-notdone |
|
Digitalworld.local(JOY)-notdone |
|
Digitalworld.local(Mercy v2)-notdonee |
|
DerpNStink |
- Wordpress (Bruteforce + Plugin)
- Creds Found in Linux
- Wireshark
- Sudo
|
RickdiculouslyEasy |
- Hidden Dir (passwords)
- Command Injection + Bypass Bash
- Bruteforce SSH
- Creds Found in Linux + additonal stuff
|
Sar1 |
- Web App Exploit
- Cronjob
|
Djinn |
- FTP anon
- Command Injection + Bypass Bash
- Creds Found in Linux
- Sudo/Python2 Input Vuln/Decompile Python2 file
|
EVM1 |
- Wordpress (Upload Reverse Shell)
- Creds Found in Linux
|
HackMe |
- SQLi Database Enum
- SUID Binary
|
Tommy Boy 1 |
- Hidden Web Dir (/prehistoricforest)
- Image Forensic
- Crack Hash
- Hidden Web Dir (/spanky)
- Bruteforce FTP
- Hidden Web Dir (/NickIzL33t)
- Edit User-Agent
- Generate password word list
- Bruteforce zip
- Wordpress (Bruteforce)
- Edit/Update mysql credentials
- Wordpress (Upload Reverse Shell)
|
Breach 1 |
- Hidden text
- Decode String
- Crack Hash
- Hidden Webpage (Click Image)
- Image Forensic (exiftool)
- Fuzz Search
- Decrypt SSL traffic
- Hidden Web Dir (/_M@nag3Me/html)
- Upload reverse shell
- Creds Found in Linux
- Image Forensic From Earlier
- Sudo (GTFO Bin)
|
Tiki 1 |
- SMB Fileshare Enum
- CMS Exploit
- Sudo
|
Prime 1 |
- Hidden Dir (/secret.txt, /image.php, /index.php)
- Enumerate parameters in
.php files - LFI
- Wordpress (Upload Reverse Shell)
- Sudo + Creds Found in Linux + Ciphertext
- Sudo/Kernel Exploit
|
Bob 1.0.1 |
- Command Injection + Bypass Bash
- Creds Found in Linux
- Sudo
|
DevGuru 1 |
- Hidden Web Dir (.git)
- Creds Found in (.git)
- CMS Exploit (RCE)
- Creds Found in Linux (.bak)
- CMS Exploit (RCE)
- Sudo Version Exploit + Sudo (GTFO Bin)
|
W34KN3SS |
- Add entry to
/etc/hosts - SSL Version Exploit
- Decompile Python Binary
- Sudo
|
Lord of the Root 1.0.1 |
- Port Knocking
- SQLi Database Enum
- MySQL running as root/Kernel Exploit/Buffer Overflow
|
Glasglow Smile 1.1 |
- Bruteforce (Cewl Wordlist)
- Joomla (Upload Reverse Shell)
- Creds Found in Linux
- Ciphertext
- Password Protected Zipfile
- Cronjob
|
GoldenEye 1 |
- Hidden Text
- Bruteforce (POP3)
- Hidden Web Dir (/gnocertdir)
- Bruteforce (POP3)
- CMS Exploit (RCE)
- Kernel Exploit
|
Toppo 1 |
- Web Rabbit Hole
- SUID Binary (GTFO Bin)
|
Hack Me Please 1 |
- Hidden Text
- Hidden Dir (/seeddms51x/seeddms-5.1.22/)
- CMS Misconfiguration
- Update SQL Credentials
- CMS Exploit (RCE)
|
Healthcare 1 |
- CMS Exploit (SQLi)
- CMS Exploit (RCE)
- SUID Binary (Path Hijacking)
|
Brainpan 1 |
- Hidden Dir (/bin)
- Buffer Overflow
- Sudo (GTFO Bin)
|
Photographer 1 |
- SMB Fileshare Enum
- CMS Exploit (File Upload)
- SUID Binary (GTFO Bins)
|
NullByte 1 |
- Image Forensics
- SQLi Database Enum
- SUID Binary (Path Hijacking)
|