x

Completed Windows Boxes

Box Methods Description Links
Algernon Desc Searchsploit service exploit https://medium.com/@Dpsypher/pg-practice-algernon-5382b92a8142
AuthBy MD5 hash cracking, kernel exploit Credentials from FTP server leading to a reverse shell upload to a web server instance pointing back to the FTP server on a certain account. X86 ‘08 Windows box meant easy kernel exploit https://medium.com/@vivek-kumar/offensive-security-proving-grounds-walk-through-authby-7d0391b0897c
Mice Evidence I need to try like a million variations sometimes to get somewhere. Privesc worked after trying multiple RDP clients out. TRY HARDER.
Monster Add when you’ve bought another pgpractice month
Fish Directory traversal vulnerability https://github.com/cel1s0/offsec-notes/blob/base/walkthroughs/pg-practice/windows/get-to-work/fish.md
Left-click: follow link, Right-click: select node, Scroll: zoom
x