This box is created by Shaun Whorton aka egotisticalSW. This box takes us through discovering a chat web application and exploiting a server-side template injection vulnerability in it to achieve code execution and receiving a stable shell to do further privilege escalation by reading logs and exploiting an instance of Splunk Universal Forwarder to gain root!
Worker is a Windows box created by ekenas. It takes us through gaining access to Azure DevOps service from hardcoded credentials in a Subversion repository which is an open source version control system and using those credentials to login and uploading a shell to the present repositories to gain low privileged access and further getting user system login credentials from a file in the machine, to get root flag we have to use Azure Pipelines to execute Powershell commands.
Hey! This article will explain you things you need to know about the Linux filesystems in an introductory and high-level manner. We will learn the hierarchy of modern days linux filesystem and interesting things to keep in mind during pentesting and other fields of work.
This room is made by Siddhant Chouhan. It takes us through API fuzzing, local file inclusion to gain RCE and exploiting a custom 64-bit binary.