Profile
Loading...
Rank
12
Points
4950
Solved
11
| Title | Objective | Status | Points |
|---|---|---|---|
DomainFall | Which user has the impersonation rights to the SQL Server Administrator account? | Completed | 450 |
DomainFall | What is the NTLM hash associated with the DBADMIN user? | Completed | 450 |
DomainFall | What is the flag retrieved from dbserver.dbcenter.infosec.local? | Completed | 450 |
DomainFall | Provide the NTLM hash of the user account responsible for Kerberos authentication in the child domain. | Completed | 450 |
DomainFall | What is the flag value found on the forest domain controller? | Completed | 450 |
TravelEndpoint | Some users have more privileges than others. Can you find something they shouldn't have left exposed? | Completed | 450 |
TravelEndpoint | Sometimes, what you send isn't what's saved. Can you manipulate the system to reveal what's hidden? | Completed | 450 |
TravelEndpoint | Certain reports are meant for specific eyes only. Can you access what's not meant for you? | Completed | 450 |
TravelEndpoint | A system's curiosity can sometimes lead it to unexpected places. Can you make it fetch something valuable? | Completed | 450 |
TravelEndpoint | Data is only as secure as its weakest link. Can you uncover information that shouldn't be accessible? | Completed | 450 |
Quiet Leak | Several shared directories were left exposed without proper restrictions. Can you identify the file the attacker retrieved from one of these unsecured locations? | Completed | 450 |