Pwned1 Walkthrough (Proving Grounds) — Root Access via FTP and Docker Privilege Escalation
Common Information
Type Value
UUID e0aea93c-921c-4b4b-acb7-797fd04f739a
Fingerprint 3ca1185a2cc18513
Analysis status DONE
Considered CTI value -2
Text language
Published Oct. 29, 2024, 6:30 a.m.
Added to db Oct. 29, 2024, 7:41 a.m.
Last updated Nov. 17, 2024, 9:42 p.m.
Headline Pwned1 Walkthrough (Proving Grounds) — Root Access via FTP and Docker Privilege Escalation
Title Pwned1 Walkthrough (Proving Grounds) — Root Access via FTP and Docker Privilege Escalation
Detected Hints/Tags/Attributes 25/1/12
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 167 Cybersecurity on Medium https://medium.com/feed/tag/cybersecurity 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details File 4
nmap_scan.txt
Details File 59
common.txt
Details File 816
index.html
Details File 258
robots.txt
Details File 1
secret.dic
Details File 28
note.txt
Details File 205
root.txt
Details File 18
proof.txt
Details IPv4 1
192.168.172.95
Details IPv4 1
192.168.214.95
Details Url 1
http://192.168.172.95
Details Url 1
http://192.168.172.95/pwned.vuln