🐀🐀🐀🐀
⚠️ Last 5 days
A Redis instance stands wide open — no authentication, no firewall, just raw access to an in-memory data store. The question isn't whether you can read it. The question is: can you turn a cache into a root shell?
Retires calculating…
🐀🐀🐀
⚠️ Last 9 days
Deep beneath the city streets runs the RatHole — a forgotten server maintained by a rodent who never learned to secure his FTP. Anonymous upload is wide open, the web root is shared, and a janky cleanup cron runs every minute as root. Leave your tools at the surface. You won't need anything fancy down here.
Retires calculating…
🐀
⚠️ Last 12 days
A TFTP server meant for network booting inadvertently serves up configuration files to anyone who asks the right filename. One leaked config is all you need — find the foothold, then find the path out.
Retires calculating…
🐀🐀🐀🐀🐀
⚠️ Last 13 days
The XSS Rat's personal research platform: a PHP blog engine with a dangerous API and a secrets-laden internal service. Chain stored XSS through to SSRF, extract admin credentials from an internal endpoint, and abuse a sudo GTFOBin to root. Nothing about this box is accidental — every quirk is a clue.
Retires calculating…
🐀
🔴 Retiring
A forgotten nameserver sits exposed on the network, its zone transfer restrictions never configured. What secrets does its DNS database hold — and can you leverage them to walk right through the front door?
Retires calculating…
🐀
🔴 Retiring
The web server proudly serves its directory tree to anyone who asks. Hidden among the exposed files lies a credential that opens more than just a web page. Look closer — the index never lies.
Retires calculating…
🐀🐀
🔴 Retiring
The mail server helpfully confirms which users exist — and the sysadmin made sure some of them have terrible passwords. Enumerate the recipients, guess the passphrase, and deliver yourself a shell.
Retires calculating…
🐀🐀
🔴 Retiring
The database administrator forgot the most important rule: always set a root password. Tap into the exposed data store, recover what was left in plaintext, and pivot your way to full control.
Retires calculating…
🐀🐀🐀
🔴 Retiring
Two file-sharing services, two attack surfaces. Pivot between SMB and FTP to piece together the credentials that bridge your path to root. Neither service alone holds the answer — the key is in the crossing.
Retires calculating…
🐀🐀
🔴 Retiring
A network management agent leaks far more than just metrics. Walk the MIB tree, read what the community string reveals, and follow the trail of exposed data straight to a root prompt.
Retires calculating…
🐀🐀
🔴 Retiring
An rsync daemon quietly exposes its modules to the world, no credentials required. Dig through the synchronized data, recover what was meant to stay private, and ride the drift all the way to root.
Retires calculating…