{"id":514,"date":"2026-01-19T16:56:02","date_gmt":"2026-01-19T16:56:02","guid":{"rendered":"https:\/\/rmfsales.com\/?p=514"},"modified":"2026-01-19T16:56:02","modified_gmt":"2026-01-19T16:56:02","slug":"hacking-23","status":"publish","type":"post","link":"https:\/\/rmfsales.com\/?p=514","title":{"rendered":"Offsec Proving Grounds Walkthrough &#8211; Air"},"content":{"rendered":"<p>This is a walkthrough of <a class=\"e029341b db828f0d\" href=\"https:\/\/www.linkedin.com\/company\/offsec-training\/\" data-view-name=\"feed-commentary\"><span class=\"ecc2605b\"><strong>OffSec<\/strong><\/span><\/a> Proving Grounds machine &#8220;Air&#8221;. I haven&#8217;t seen any walkthroughs of this machine out there! In this video we a directory traversal exploit to access an SSH private key, we then use tools like chisel to take advantage of Aria2 software by uploading our own private keys to the machine to obtain root access ***SPOILER***Walkthrough of the machine called &#8220;Air&#8221; in the Offsec Proving Grounds&#8230;don&#8217;t watch unless you want help getting through the machine.<\/p>\n<div class=\"jetpack-video-wrapper\"><iframe loading=\"lazy\" title=\"Offsec Proving Grounds Walkthrough - Air\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/TT3wrwaPfa8?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This is a walkthrough of OffSec Proving Grounds machine &#8220;Air&#8221;. I haven&#8217;t seen any walkthroughs of this machine out there! In this video we a directory traversal exploit to access an SSH private key, we then use tools like chisel to take advantage of Aria2 software by uploading our own&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[53,48,7,55,44,10,54],"tags":[51,13,28,57,46,15,56],"class_list":["post-514","post","type-post","status-publish","format-standard","hentry","category-ethical-hacking","category-hacking","category-linux","category-offsec","category-security","category-tutorial","category-walkthrough","tag-cybersecurity","tag-linux","tag-networking","tag-offsec","tag-security","tag-tutorial","tag-walkthrough"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/rmfsales.com\/index.php?rest_route=\/wp\/v2\/posts\/514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rmfsales.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rmfsales.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rmfsales.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rmfsales.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=514"}],"version-history":[{"count":1,"href":"https:\/\/rmfsales.com\/index.php?rest_route=\/wp\/v2\/posts\/514\/revisions"}],"predecessor-version":[{"id":515,"href":"https:\/\/rmfsales.com\/index.php?rest_route=\/wp\/v2\/posts\/514\/revisions\/515"}],"wp:attachment":[{"href":"https:\/\/rmfsales.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rmfsales.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rmfsales.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}