Welcome to the Offensive Security CTF Project! This repository contains concise write-ups of Capture The Flag (CTF) challenges conducted on a hypothetical company, Rekall Corporation. The challenges focus on three main areas: Web Security, Linux Servers, and Windows Servers.
In this challenge, we identified and exploited vulnerabilities in Rekall's web application. These included Cross-Site Scripting (XSS), SQL Injection, and Local File Inclusion. One example involved exploiting an advanced XSS vulnerability on the Memory-Planner.php webpage by using a split script tag, allowing the execution of arbitrary JavaScript code in the user's browser.
This challenge involved identifying and exploiting a range of vulnerabilities on Linux servers. These included Command Injection, Brute Force Attacks, and a Remote Code Execution vulnerability in Apache Tomcat (CVE-2017-12617). A notable instance was when we exploited a sudo vulnerability (CVE-2019-14287) for privilege escalation.
In this challenge, we exploited a variety of vulnerabilities on Windows servers. These included Sensitive Data Exposure, Cached Credential vulnerabilities, and a Remote Code Execution vulnerability in SLMail service. One notable achievement was exploiting a Cached Credential vulnerability to impersonate a high-privileged user and gain unauthorized access to sensitive data.
These write-ups provide a brief overview of the CTF challenges. For a more detailed walkthrough, please refer to the full report. This project serves as a valuable resource for understanding potential security risks and how to address them.