Explore >> Select a destination


You are here

leeadams.dev
| | blog.ikuamike.io
8.6 parsecs away

Travel
| | Difficulty Release Date Author Beginner 15 Feb 2020 Love Summary In this box there's only one port open that is running a vulnerable version of sar2html that we take advantage of to get a low priv shell. For privilege escalation there was a cron job running as root that was running a script we could write in. Reconnaissance Nmap Nmap scan report for 192.168.56.107 Host is up (0.000040s latency). Not shown: 65534 closed ports PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.
| | 0xdf.gitlab.io
10.6 parsecs away

Travel
| | Active was an example of an easy box that still provided a lot of opportunity to learn. The box was centered around common vulnerabilities associated with Active Directory. There's a good chance to practice SMB enumeration. It also gives the opportunity to use Kerberoasting against a Windows Domain, which, if you're not a pentester, you may not have had the chance to do before.
| | packetstormsecurity.com
9.2 parsecs away

Travel
| | Information Security Services, News, Files, Tools, Exploits, Advisories, and Whitepapers
| | www.cybereason.com
75.8 parsecs away

Travel
| A critical, unauthenticated remote code execution vulnerability, tracked as CVE-2025-32433, have been discovered in Erlang/OTP's SSH implementation.