Pwned1 Walkthrough (Proving Grounds) — Root Access via FTP and Docker Privilege Escalation
Tags
attack-pattern: | Credentials - T1589.001 Server - T1583.004 Server - T1584.004 Ssh - T1021.004 Sudo - T1169 |
Common Information
Type | Value |
---|---|
UUID | e0aea93c-921c-4b4b-acb7-797fd04f739a |
Fingerprint | 3ca1185a2cc18513 |
Analysis status | DONE |
Considered CTI value | -2 |
Text language | |
Published | Oct. 29, 2024, 6:30 a.m. |
Added to db | Oct. 29, 2024, 7:41 a.m. |
Last updated | Nov. 17, 2024, 9:42 p.m. |
Headline | Pwned1 Walkthrough (Proving Grounds) — Root Access via FTP and Docker Privilege Escalation |
Title | Pwned1 Walkthrough (Proving Grounds) — Root Access via FTP and Docker Privilege Escalation |
Detected Hints/Tags/Attributes | 25/1/12 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 167 | ✔ | Cybersecurity on Medium | https://medium.com/feed/tag/cybersecurity | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | File | 4 | nmap_scan.txt |
|
Details | File | 59 | common.txt |
|
Details | File | 816 | index.html |
|
Details | File | 258 | robots.txt |
|
Details | File | 1 | secret.dic |
|
Details | File | 28 | note.txt |
|
Details | File | 205 | root.txt |
|
Details | File | 18 | proof.txt |
|
Details | IPv4 | 1 | 192.168.172.95 |
|
Details | IPv4 | 1 | 192.168.214.95 |
|
Details | Url | 1 | http://192.168.172.95 |
|
Details | Url | 1 | http://192.168.172.95/pwned.vuln |