challenges
97 TopicsThe Maze Challenge
Put your Offensive Security skills to the ultimate test in eight of the most challenging offensive labs ever assembled by the Immersive team - welcome to The Maze! Navigate a series of eight “mazes” of increasing complexity based on real-world-inspired cyber attack scenarios, testing a variety of offensive skills, such as web, infrastructure, Active Directory, scripting, and binary exploitation. Best of all, taking part gives you a fantastic opportunity to win exclusive challenge coins and be recognized in our Cyber Resilience Awards during Cyber Awareness Month! Do you think you have what it takes to escape The Maze? Try it Now: Maze Want to get a head start on the competition? Join the fiendish minds behind The Maze in the Immersive community, Tuesday 19th August, for a Live walkthrough of the first lab in the series “The Improbable Maze” and providing hints and tips that will help you to escape some of the other mazes. Register Now: Labs Live844Views2likes15CommentsThe Haunted Hollow: Mirrored Mayhem
I'm looking for a nudge to escalate privileges to root for this lab. I can see that the binary mm has SUID permissions; but I can't work out what process I can exploit to run a malicious mm binary as. The output on the terminal is mirrored, which doesn't help. Can anyone offer a nudge?Solved40Views0likes1CommentTrick or Treat on Specter Street: Widow's Web
I am very stucked in Trick or Treat on Specter Street: Widow's Web I can't do none of the questions, but in any case I start by 4th that is the first answerable one Your first task is to simulate the loyal Crawlers. Run legitimate-crawler and inspect the output in Lab-Files to observe their behavior. To simulate the rogue Crawlers, you must discover the hidden paths on the website. Read the blog posts – they contain clues. Disallow these in Website-Files/robots.txt and run malicious-crawler. Inspect the output in Lab-Files. What is the token? I have created the robots.txt file since I understand that malicious-crawler goes expressedly there. My robots.txt contains all url's I can imagin Disallow: /secret Disallow: /treat Disallow: /hidden Disallow: /crypt Disallow: /warden Disallow: /rituals Disallow: /witch-secrets Disallow: /admin Disallow: /vault Disallow: /uncover Disallow: /post1 Disallow: /post2 Disallow: /post3 Disallow: /post4 Disallow: /contact Disallow: /drafts/rituals But the result of malicious-crawler.txt doesn't give me either a token nor a hint I have curl-ed all pages looking for words as token and nothing. I have found some key words in http://127.0.0.1:3000/witch-secrets as intercepted-incantations, decoded them and nothing. I have searched in spider-sigthings.log what hapened at 3.00 am but nothing Can someone gime me a hint?246Views0likes7CommentsTrick or Treat on Specter Street: Phantom Pages
Hey everyone! 👋 I've been working through Trick or Treat and having a blast so far. However, I've hit a wall on Question #3 of Phantom Pages and could use some help! What I've tried: Found the library and answer to #2 Examined all the book titles Identified 3 titles that have numbers at the end Reviewed the available hints I have these books with the numbers (horror, swamp and mask) but I'm not sure how to combine or use anything to create the 9 digits authorization code. Am I missing a pattern? Should I be looking at something else? Any hints or help would be greatly appreciated! Thanks in advance!Solved221Views0likes4CommentsTrick or Treat on Specter Street: Serpent Sanctum
So for this challenge we have got hint: (serpent-statue) $ hint Maybe the fang can be in two places at once... Tried to copy both fang.key and fang2.key to statue folder but it did not allow me. The error message: The statue's eyes flare red with anger. This is merely a copy; a false fang with no power. The worthless copy crumbles to dust in your hands. What other methods can we try here? Anyone solved it already?Solved47Views0likes5CommentsCVE-2022-26134 (Confluence) – OGNL Injection
For Question 6. Look at the first exploit attempt by this attacker. What command did they run? I am wondering about why when sharing the commands found in the logs, it still outputs wrong. even if typing in "X-Cmd-Response" as the command as well as the entire string found. Wondering if they are exepecting a different format/snippet of the code, or the GET requests instead?46Views0likes4CommentsTerraPoint: Ep.10 – Global Synthesis
This is a crazy challenge. We need to get within 10m distance from a place in the middle of banana plantation in probably East Africa. No sign of any kind is visible. How do I even start? Based on the good condition of the paved road, my best guess is somewhere along Rwanda's National Route 1, but that's both uncertain and does not make the final pinning any easier.54Views0likes3Comments