ls -la ./machines (15)
DevArea
[Linux]
▲ pwned // not yet retired
Kobold
[Linux]
▲ pwned // not yet retired
VariaType
[Linux]
▲ pwned // not yet retired
CCTV
[Linux]
▲ pwned // not yet retired
Interpreter
[Linux]
▲ pwned // not yet retired
WingData
[Linux]
▲ pwned // not yet retired
Pterodactyl
[Linux]
▲ pwned // not yet retired
Facts
[Linux]
▲ pwned // not yet retired
Overwatch
[Windows]
▲ pwned // not yet retired
AirTouch
[Linux]
▲ pwned // not yet retired
Browsed
[Linux]
Malicious Chrome MV3 extension uploaded to server-side browser achieved RCE via bash arithmetic evaluation in a Flask/bash backend, then escalated to root via .pyc injection into a world-writable __pycache__ directory of a sudo-allowed Python script.
● pwned
MonitorsFour
[Windows]
▲ pwned // not yet retired
Expressway
[Linux]
IKEv1 Aggressive Mode PSK hash capture and offline brute-force reveals SSH credentials; custom sudo 1.9.17 binary is exploited via CVE-2025-32463 NSS library injection to achieve root.
● pwned
Baby
[Windows]
LDAP anonymous bind leaks an initial password in a user description; the target user (Caroline.Robinson) has STATUS_PASSWORD_MUST_CHANGE set, allowing password reset via SAMR; Backup Operators group membership enables direct flag read via FILE_OPEN_FOR_BACKUP_INTENT over SMB.
● pwned
Eighteen
[Windows]
▲ pwned // not yet retired