Offsec Proving Grounds Walkthrough – LaVita

⚡This is a walkthrough of OffSec Proving Grounds machine called "LaVita" In this walkthrough we exploit the Laravel PHP Framework using a python exploit, utilize pspy64 to view processes running as other users, and perform shell injection into running processes to get access to another account. Finally, we utilize GTFObins…

Offsec Proving Grounds Walkthrough – Monster

📣Walkthrough of the machine called "Monster" in the OffSec Proving Grounds. We take advantage of Monstra using a python exploit, then use enumeration to figure out that XAMPP is running on the server and exploit that for privilege escalation. Trying to learn more PowerShell and this helped! ***SPOILERS*** I show…

Offsec Proving Grounds Walkthrough – Symbolic

🎥I have a backlog of recorded videos🎥 so you get another bonus walkthrough! This is a walkthrough of Offsec Proving Grounds machine called "Symbolic". In this walkthrough we exploit a HTML to PDF website using tools like gobuster, a Google Project Zero tool called CreateSymlink, and privesc with SSH key…

Offsec Proving Grounds Walkthrough – Sorcerer

📣This is a walkthrough of the Offsec machine called "Sorcerer". I really enjoyed this one and there aren't too many walkthroughs of it available, so I hope this helps! It features exploitation using gobuster, script modification, scp, SSH Keys, and abusing binaries with the SUID set. I learned a lot…

Offsec Proving Grounds Walkthrough – RubyDome

🆕🆕🆕 walkthrough! Walkthrough of the machine called "RubyDome" in the OffSec Proving Grounds...don't watch unless you want help getting through the machine. In this machine we abuse pdfKit utilizing a python exploit to gain a shell and then escalate privileges using an incorrectly set "sudo no password" on a Ruby…

BadUSB aka Rubber Ducky – Don’t plug in unknown flash drives!

A very short and humorous but very serious reminder of why plugging in unknown USB devices is a bad idea...what until the end for the humorous part. Just say no to plugging in flash drives you find or aren't sure of! Using HAK5, LLC's Rubber Ducky for the demonstration. https://youtube.com/shorts/in4IvxcWkko