This room revolves around network scanning, directory bruteforce, environmental path variable manipulation, horizontal privilege escalation and vertical privilege escalation.
Chapters:-
0:00 Wonderland Room - Introduction
0:48 Network Scanning
1:49 Directory BruteForce
3:12 SSH Credentials - Alice
4:33 SSH Login - Alice
4:44 Script Manipulation
6:05 Horizontal Privilege Escalation (Rabbit)
8:36 Account Access - Rabbit
9:03 Horizontal Privilege Escalation (Hatter)
10:19 Envrionmental Path Variable Manipulation
12:42 Account Access - Hatter
13:29 Linux Enumeration - Linpeas
15:40 Capabilities Exploitation
17:11 Vertical Linux Privilege Escalation
17:31 Root Access
17:50 User Flag
18:27 Root Flag
#VerticalPrivilegeEscalation
#Wonderland #Alice #Hatter #rabbit
#AliceInWonderLand
#HorizontalPrivilegeEscalation