-
CyberDefenders: Hacked You have been called to analyze a compromised Linux web server. Figure out how the threat actor gained access, what modifications were applied to the system, and what persistent techniques were utilized. (e.g. backdoors, users, sessions, etc). Tools: FTKImager R-studio recovery Guide: mounting …
Read More -
Proving Grounds - InfosecPrep Scanning & Enumeration As always we start by scanning for open ports: Two ports come back as open: Port 22: running OpenSSH 8.2p1 Port 80: running Apache 2.4.41 We also see a secret.txt file in the disallowed list from robots.txt Reading the website we discover that the only user on …
Read More -
Proving Grounds - Born2Root I recently created an account on Proving Grounds Play. The free account gives you 3hours a day access to vulnerable machines. So I decided to make the most out of it and finally start practicing my report writing skills. Without further ado ... here we go: Scanning & Enumeration We start …
Read More