Buff
Easy Windows box exploiting Gym Management Software RCE then a CloudMe buffer overflow for PrivEsc.
Easy Windows box exploiting Gym Management Software RCE then a CloudMe buffer overflow for PrivEsc.
Easy Windows box using default Tomcat Manager credentials to deploy a WAR reverse shell and gain SYSTEM.
Easy Windows XP machine vulnerable to MS08‑067 EternalBlue SMB exploit for root.
Easy Windows box with anonymous FTP to steal PRTG config, then RCE via PRTG Network Monitor.
Easy Windows machine exploiting HttpFileServer 2.3 RCE for initial shell and unpatched kernel vulnerability for PrivEsc.
Easy Active Directory Windows box using AS-REP Roasting and Kerberoasting to escalate to SYSTEM.
Easy Windows box with SQL injection in a Docker Toolbox‑hosted app, leading to container escape and host PrivEsc.