AIH4user22

Germany

2nd place

460 points


Awards


Solves

Challenge Category Value Time
IAM Exploitation Cloud Pentesting 10
Cloud Secret Extraction Cloud Pentesting 10
IaaS Exploitation Cloud Pentesting 10
Cloud Storage Services 1 Cloud Pentesting 10
FaaS Exploitation 2 Cloud Pentesting 10
FaaS Exploitation Cloud Pentesting 10
VLAN 4 VPN / VoIP / VPN Hacking 10
VLAN 3 VPN / VoIP / VPN Hacking 10
VLAN 2 VPN / VoIP / VPN Hacking 10
VLAN 1 VPN / VoIP / VPN Hacking 10
VPN 2 VPN / VoIP / VPN Hacking 10
VPN 1 VPN / VoIP / VPN Hacking 10
Oracle Database Enumeration Web Technologies 10
Oracle Database Exploitation Web Technologies 10
MySQL Database Web Technologies 10
Deserialization Exploit Web Technologies 10
Java Deserialization Exploits Web Technologies 10
*nix post exploitation Hacking *nix 10
Docker Breakout 2 Container Technologies 10
Privilege Escalation Hacking *nix 10
Docker Breakout 1 Container Technologies 10
Mongo DB Hacking *nix 10
X11 Hacking *nix 10
Privilege Escalation Hacking *nix 10
Privilege Escalation Hacking *nix 10
Shell Breakout Hacking *nix 10
Shell Breakout Hacking *nix 10
Cross Forest Trust Abuse: FSP Hacking Windows 10
Cross Forest Trust Abuse: Kerberoasting Hacking Windows 10
Postgres Database Web Technologies 10
Privilege Escalation via in-memory credentials Hacking Windows 10
Lateral Movement 2 Hacking Windows 10
Privilege Escalation via Credentials Harvesting Hacking Windows 10
Lateral Movement 1 Hacking Windows 10
Pivoting 1 Hacking Windows 10
Pivoting Hacking Windows 10
AD Delegation 2 Hacking Windows 10
AD Delegation Hacking Windows 10
Privilege Escalation to Sysadmin Hacking Windows 10
Windows Enumeration Hacking Windows 10
Continuous Integration Server Exploitation Web Technologies 10
Distributed Version Control Systems Web Technologies 10
Open Source Intelligence Gathering Discovery 10
Open Source Intelligence Exploitation Discovery 10
Service Exploitation Discovery 10
Network Mapping Discovery 10