To access material, start machines and answer questions login.
Overpass has been hacked! The team (Paradox, congratulations on the promotion) noticed suspicious activity on a late night shift while looking at shibes, and managed to capture packets as the attack happened.
Can you work out how the attacker got in, and hack your way back into Overpass' production server?
Note: Although this room is a walkthrough, it expects familiarity with tools and . I recommend learning basic Wireshark and completing Fundamentals as a bare minimum.
md5sum of file: 11c3b2e9221865580295bc662c35c6dc
What payload did the attacker use to gain access?
What password did the attacker use to privesc?
How did the attacker establish persistence?
Using the fasttrack wordlist, how many of the system passwords were crackable?
Ready to learn Cyber Security?
The Overpass 2 - Hacked room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
