Explore >> Select a destination


You are here

adsecurity.org
| | blog.aghanim.net
8.9 parsecs away

Travel
| |
| | www.deepinstinct.com
9.3 parsecs away

Travel
| | LSASS memory dump files aid attackers to swiftly extract credentials. Read an in-depth analysis of LSASS dumps as an attack vector & dumping methods.
| | sensepost.com
8.7 parsecs away

Travel
| | Leaders in Information Security
| | blog.ikuamike.io
71.7 parsecs away

Travel
| Difficulty Release Date Author Intermediate 18 July 2019 Zayotic Summary This box had quite a good number of misconfigurations and vulnerabilities. Initial access was through copying a shadow backup file to a smb share accessible anonymously using a file copy vulnerability in proftpd. Then lateral movement and privilege escalation was achieved by exploiting rce a locally running librenms instance and finally abusing sudo permissions on mysql to get root.