Initializing target acquisition...
Target: Secure Portal
EasyA poorly coded login form protects a sensitive admin panel. Bypass the authentication to gain access and retrieve the system flag.
Probe PortalTarget: Internal Search
EasyThis internal search endpoint reflects user input directly. Find the hidden session token on the page and exfiltrate it using a script.
Probe SearchTarget: Network Services
MediumBypass filters to access the filesystem and execute commands.
Probe Network UtilTarget: User Profiles
Log in as 'user1' (password: password123). Each profile contains sensitive data like clearance levels. Find a way to view other profiles to locate the flag in a high-value employee's notes.
LoginLive Intel Log
[23:41:15] MONITOR: Unusual outbound DNS query from webapp-01.
[23:40:28] AUTH: Multiple failed login attempts for user 'admin' from internal IP.
[23:39:02] KERNEL: SUID binary '/usr/local/bin/status' executed by user www-data.
[23:37:44] DB: Query returned zero results on articles table. Possible enumeration detected.