Offsec Proving Grounds Walkthrough – Sorcerer

๐Ÿ“ฃThis is a walkthrough of the Offsec machine called "Sorcerer". I really enjoyed this one and there aren't too many walkthroughs of it available, so I hope this helps! It features exploitation using gobuster, script modification, scp, SSH Keys, and abusing binaries with the SUID set. I learned a lot…

Offsec Proving Grounds Walkthrough – RubyDome

๐Ÿ†•๐Ÿ†•๐Ÿ†• walkthrough! Walkthrough of the machine called "RubyDome" in the OffSec Proving Grounds...don't watch unless you want help getting through the machine. In this machine we abuse pdfKit utilizing a python exploit to gain a shell and then escalate privileges using an incorrectly set "sudo no password" on a Ruby…

Offsec Proving Grounds Walkthrough – Twiggy

๐ŸšจWalkthrough of the machine called "Twiggy" in the OffSec Proving Grounds...don't watch unless you want help getting through the machine. I had some issues with figuring out how to take advantage of the exploit but eventually prevailed after some experimentation. We take advantage of a RCE in ZeroMQ ZMTP software…

Offsec Proving Grounds Walkthrough – CVE-2024-48061

New Vid! (sorry for posting later than usual the holiday got me!) ***SPOILER***Walkthrough of the OffSec machine called "CVE-2024-48061" in the Proving Grounds...we exploit LangFlow using an RCE flaw, don't watch unless you want help getting through the machine. https://youtu.be/hNSSYO-dxwM?si=XVTJCBjOlzgxG-x1

Offsec Proving Grounds Walkthrough – CVE-2023-6019

Another OffSec walkthrough, this time we are doing a machine called CVE-2023-6019...so guess what vulnerability we exploit here, LOL. I show you how to setup a python virtual environment and run the exploit to get a root shell. ***SPOILER***Walkthrough of the machine called "CVE-2023-6019" in the Offsec Proving Grounds...don't watch…