Dive into a realistic web application penetration testing scenario featuring Apache Tomcat. This server has been left with dangerous default configurations and sudo misconfigurations that could lead to complete system compromise. 🎯 Master the art of web application exploitation, WAR file deployment, and Linux privilege escalation in this hands-on challenge.
Launch your dedicated AWS machine to begin hacking
Welcome to Compromised 1! This challenge simulates a real-world scenario where you need to exploit a misconfigured Apache Tomcat server. The target system has been set up with common misconfigurations that can lead to complete system compromise through web application exploitation and privilege escalation.
You have discovered a web server running Apache Tomcat that appears to be misconfigured. Your objective is to gain initial access through the web application, escalate privileges to root, and retrieve sensitive flags from the system. The server may have weak credentials and dangerous sudo permissions that can be exploited.
Sign-in to your account to access your hacking courses and cyber security labs.
Access all hacking courses and cyber security labs.