Offsec Proving Grounds Walkthrough – Symbolic

🎥I have a backlog of recorded videos🎥 so you get another bonus walkthrough! This is a walkthrough of Offsec Proving Grounds machine called "Symbolic". In this walkthrough we exploit a HTML to PDF website using tools like gobuster, a Google Project Zero tool called CreateSymlink, and privesc with SSH key…

Offsec Proving Grounds Walkthrough – Sorcerer

📣This is a walkthrough of the Offsec machine called "Sorcerer". I really enjoyed this one and there aren't too many walkthroughs of it available, so I hope this helps! It features exploitation using gobuster, script modification, scp, SSH Keys, and abusing binaries with the SUID set. I learned a lot…

Offsec Proving Grounds Walkthrough – RubyDome

🆕🆕🆕 walkthrough! Walkthrough of the machine called "RubyDome" in the OffSec Proving Grounds...don't watch unless you want help getting through the machine. In this machine we abuse pdfKit utilizing a python exploit to gain a shell and then escalate privileges using an incorrectly set "sudo no password" on a Ruby…

Offsec Proving Grounds Walkthrough – Twiggy

🚨Walkthrough of the machine called "Twiggy" in the OffSec Proving Grounds...don't watch unless you want help getting through the machine. I had some issues with figuring out how to take advantage of the exploit but eventually prevailed after some experimentation. We take advantage of a RCE in ZeroMQ ZMTP software…