Web-to-Root Linux Lab: Exploiting a GLPI Intranet Misconfiguration
intermediate
16 tasks
1 hour
Dive into a step-by-step penetration testing guide for the vulnerable VM. This medium-difficulty walkthrough simulates a real-world assessment, from initial reconnaissance to full root access. Learn how to identify default credentials, bypass file upload restrictions, exploit web shells, crack password hashes, and leverage misconfigured cron jobs for privilege escalation. Whether you're sharpening your red-team skills or preparing for OSCP-level labs, this walkthrough delivers practical insights, tool usage, and tips for every phase of exploitation.
List of tasks
- Tasks
- Introduction
- Finding the Target's IP Address
- Reconnaissance
- Initial Web Application Exploration
- Exploiting Default Credentials
- Discovering GLPI & Initial Upload
- Bypassing File Upload Restrictions
- Modify Burp Request
- Checking the Upload file
- Getting A Reverse Shell
- Discovering Database Credentials
- Discover Databases
- Cracking User Password from Database
- Gaining Access as User tally
- Enumerating Cron Jobs for Privilege Escalation
- Capture root flag