{"id":346,"date":"2025-10-17T11:36:25","date_gmt":"2025-10-17T11:36:25","guid":{"rendered":"https:\/\/rmfsales.com\/?p=346"},"modified":"2025-10-17T11:36:25","modified_gmt":"2025-10-17T11:36:25","slug":"offsec-proving-grounds-walkthrough-symbolic","status":"publish","type":"post","link":"https:\/\/rmfsales.com\/?p=346","title":{"rendered":"Offsec Proving Grounds Walkthrough &#8211; Symbolic"},"content":{"rendered":"<p>\ud83c\udfa5I have a backlog of recorded videos\ud83c\udfa5 so you get another bonus walkthrough! This is a walkthrough of Offsec Proving Grounds machine called &#8220;Symbolic&#8221;. In this walkthrough we exploit a HTML to PDF website using tools like gobuster, a Google Project Zero tool called CreateSymlink, and privesc with SSH key abuse. ***SPOILER*** don&#8217;t watch unless you want help getting through the machine. \ud83d\udcbb\ud83e\uddb9<\/p>\n<p>I keep calling the user Pyload but it is Payload, LOL&#8230;I have another Offsec machine on my mind apparently!<\/p>\n<p>There aren&#8217;t many, if any walkthroughs of this machine so, you&#8217;re welcome!<\/p>\n<div class=\"jetpack-video-wrapper\"><iframe loading=\"lazy\" title=\"Offsec Proving Grounds Walkthrough - Symbolic\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/xLLpyg28pRQ?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ud83c\udfa5I have a backlog of recorded videos\ud83c\udfa5 so you get another bonus walkthrough! This is a walkthrough of Offsec Proving Grounds machine called &#8220;Symbolic&#8221;. In this walkthrough we exploit a HTML to PDF website using tools like gobuster, a Google Project Zero tool called CreateSymlink, and privesc with SSH key&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[53,48,7,27,55,73,44,10,54],"tags":[51,13,28,57,74,46,15,56],"class_list":["post-346","post","type-post","status-publish","format-standard","hentry","category-ethical-hacking","category-hacking","category-linux","category-networking","category-offsec","category-python","category-security","category-tutorial","category-walkthrough","tag-cybersecurity","tag-linux","tag-networking","tag-offsec","tag-python","tag-security","tag-tutorial","tag-walkthrough"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/rmfsales.com\/index.php?rest_route=\/wp\/v2\/posts\/346","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rmfsales.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rmfsales.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rmfsales.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rmfsales.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=346"}],"version-history":[{"count":1,"href":"https:\/\/rmfsales.com\/index.php?rest_route=\/wp\/v2\/posts\/346\/revisions"}],"predecessor-version":[{"id":347,"href":"https:\/\/rmfsales.com\/index.php?rest_route=\/wp\/v2\/posts\/346\/revisions\/347"}],"wp:attachment":[{"href":"https:\/\/rmfsales.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=346"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rmfsales.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=346"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rmfsales.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}