I'll go through how I would configure a brand-new Windows Server 2022 virtual machine, walk through the entire creation process, and then turn it into a template so it can be quickly deployed at a later time.
A vulnerable version of Pi-Hole is running which can be leveraged to gain an initial shell on the box as a low-privileged user. An overly permissive cronjob is then abused to obtain a root shell.
Fuel is a beginner-rated machine on CyberSecLabs and features a version of Fuel CMS that is vulnerable to CVE-2018-16763. We discover a password in the bash history which is used to gain root access.
\x01 Introduction
Hey, I didn't wait months after clearing the exam to write a review for it, unlike my PNPT review! I recently sat the Certified Red Team Professional exam and