top of page
Search

Daily Schedule

The breakdown of challenges (all of which align with the OWASP top 10) per days are as follows:

Day 1) Injection Day 2) Broken Authentication Day 3) Sensitive Data Exposure Day 4) XML External Entity Day 5) Broken Access Control Day 6) Security Misconfiguration Day 7) Cross-site Scripting Day 8) Insecure Deserialization Day 9) Components with Known Vulnerabilities Day 10) Insufficent Logging & Monitoring


This room is a good theoretical refresher of the some penetration testing related questions.Let’s get started,


To complete the questions below, navigate to http://<machine-ip>/evilshell.php


[Day 1] Command Injection Practical



#1 What strange text file is in the website root directory?

ANSWER: Use the command "ls" to list the directory in website, you will get the strange txt file.







#2 How many non-root/non-service/non-daemon users are there?


ANSWER: Use "cd" command to traverse the directory to list the user on the system.




#3 What user is this app running as?


ANSWER: Use "id" command to get the user.




#4 What is the user's shell set as?


ANSWER: "getent" command that helps the user to get the entries in a number of important text files






#5 What version of Ubuntu is running?

ANSWER: To find the version of the OS find issue.net file and print it.





#6 Print out the MOTD.What favorite beverage is shown?

ANSWER: Go to motd.d file try to print out if you cannot find the word then use "00-header"(hint in tryhackme) at end of command to print the specific header file



                       
 
 
 

© 2023 by Cyber-Edge. Proudly created with Lucifer

LET'S TAKE IT TO THE NEXT LEVEL

Thanks for submitting!

bottom of page