App - Script

Exploit environment weaknesses, configuration mistakes and common vulnerability patterns in shell scripting and system hardening.

For each of these challenges, you will be provided with connection credentials such as SSH access or a network socket. Depending on the challenge you will need to elevate your privileges or escape the sandbox by exploiting the provided environment.

Prerequisites:
- Some knowledge of the UNIX shell and of common UNIX privilege escalation techniques
- Advanced understanding of scripting languages such as Python, Perl, PHP in order to escape jails

Challenge Results Challenge Results

Pseudo Challenge Lang date
Oshimai   Bash - System 1 fr 17 August 2019 at 21:09
sin4ts   Bash - Shells restreints fr 17 August 2019 at 20:57
Fenrir   Python - input() en 17 August 2019 at 20:14
Fenrir   Bash - cron en 17 August 2019 at 20:12
sonbeta3   Python - input() en 17 August 2019 at 20:06
Fenrir   Perl - Command injection en 17 August 2019 at 19:47
Fenrir   Bash - System 2 en 17 August 2019 at 19:42
Fenrir   sudo - weak configuration en 17 August 2019 at 19:28
sonbeta3   Bash - System 2 en 17 August 2019 at 19:25
shadowbacK   Bash - System 1 fr 17 August 2019 at 19:20