Completed Windows Boxes
| Box | Methods | Description | Links |
|---|---|---|---|
| Algernon | Desc | Searchsploit service exploit | https://medium.com/@Dpsypher/pg-practice-algernon-5382b92a8142 |
| AuthBy | MD5 hash cracking, kernel exploit | Credentials from FTP server leading to a reverse shell upload to a web server instance pointing back to the FTP server on a certain account. X86 ‘08 Windows box meant easy kernel exploit | https://medium.com/@vivek-kumar/offensive-security-proving-grounds-walk-through-authby-7d0391b0897c |
| Mice | Evidence I need to try like a million variations sometimes to get somewhere. Privesc worked after trying multiple RDP clients out. TRY HARDER. | ||
| Monster | Add when you’ve bought another pgpractice month | ||
| Fish | Directory traversal vulnerability | https://github.com/cel1s0/offsec-notes/blob/base/walkthroughs/pg-practice/windows/get-to-work/fish.md |