Offsec Proving Grounds Walkthrough – Symbolic

🎥I have a backlog of recorded videos🎥 so you get another bonus walkthrough! This is a walkthrough of Offsec Proving Grounds machine called "Symbolic". In this walkthrough we exploit a HTML to PDF website using tools like gobuster, a Google Project Zero tool called CreateSymlink, and privesc with SSH key…

Offsec Proving Grounds Walkthrough – Sorcerer

📣This is a walkthrough of the Offsec machine called "Sorcerer". I really enjoyed this one and there aren't too many walkthroughs of it available, so I hope this helps! It features exploitation using gobuster, script modification, scp, SSH Keys, and abusing binaries with the SUID set. I learned a lot…

Offsec Proving Grounds Walkthrough – RubyDome

🆕🆕🆕 walkthrough! Walkthrough of the machine called "RubyDome" in the OffSec Proving Grounds...don't watch unless you want help getting through the machine. In this machine we abuse pdfKit utilizing a python exploit to gain a shell and then escalate privileges using an incorrectly set "sudo no password" on a Ruby…

BadUSB aka Rubber Ducky – Don’t plug in unknown flash drives!

A very short and humorous but very serious reminder of why plugging in unknown USB devices is a bad idea...what until the end for the humorous part. Just say no to plugging in flash drives you find or aren't sure of! Using HAK5, LLC's Rubber Ducky for the demonstration. https://youtube.com/shorts/in4IvxcWkko

Offsec Proving Grounds Walkthrough – Twiggy

🚨Walkthrough of the machine called "Twiggy" in the OffSec Proving Grounds...don't watch unless you want help getting through the machine. I had some issues with figuring out how to take advantage of the exploit but eventually prevailed after some experimentation. We take advantage of a RCE in ZeroMQ ZMTP software…