Offsec Proving Grounds Walkthrough – Vault

Walkthrough of the machine called "Vault" in the OffSec Proving Grounds...This is a Windows machine rated as hard, don't watch unless you want help getting through the machine. In this machine we use phishing type links on an open SMB share to catch hashes using responder for initial access, after…

How to write a Windows 32-bit buffer overflow!

In this video we write a 32 bit buffer overflow together in python using tools like Immunity Debugger, Mona, and msfvenom. I show you how to: 1.) Fuzz the application 2.) Determine the offset 3.) Control the eip cpu register 4.) Determine your bad characters (manually and using Mona) 5.)…

Offsec Proving Grounds Walkthrough – Interface

This was a good one! This is a walkthrough of OffSec Proving Grounds machine "Interface". I haven't seen any walkthroughs of this machine out there. In this video we use hydra to brute force a node.js web application after using the browser's developer tools to discover API endpoints (user list).…

Offsec Proving Grounds Walkthrough – Filebrowser

Walkthrough of the machine called "Filebrowser" in the OffSec Proving Grounds...don't watch unless you want help getting through the machine. In this video we take advantage of weak credentials for an online file browsing application, take advantage of SSH keys, then escalate using incorrectly set SUID on a binary. https://youtu.be/DHX2XFdpG5g