• Users: 5
  • Difficulty Level: Intermediate +
  • Hint: PTES, OWASP and Encryption knowledge. For initial foothold, network analysis and enumeration are important.

Are you ready for Glasgow Smile 2? GS2 follows the philosophy of Glasgow Smile. It's a CTF vs OSCP.

If you are a newbie in Penetration Testing and afraid of OSCP preparation, do not worry. Glasgow Smile2 is supposed to be a kind of gym for OSCP machines.

The machine is designed to be a DC tribute but also a kind of real life techniques container. You will find also a bunch of ctf style challanges.

You need to have enough information about Linux enumeration, PTES and encryption for privileges escalation.

About the VM

Just download, extract and load the .ova file in VMware Workstation (tested on VMware Workstation 15.x.x)

The adapter is currently NAT, networking is configured for DHCP and IP will get assigned automatically

Contact

You can contact me on Hack the box (https://www.hackthebox.eu/profile/232477) or by email ([email protected]) for hints!

P.S If you liked my machines, offer me a coffee, I'll work on the next one! Thank you! ( https://www.buymeacoffee.com/mindsflee)

Title: Glasgow Smile

  • Users: 5
  • Difficulty Level: Initial Shell (Easy) - Privileges Escalation (Intermediate)
  • Hint: Enumeration is the key.

If you are a newbie in Penetration Testing and afraid of OSCP preparation, do not worry. Glasgow Smile is supposed to be a kind of gym for OSCP machines.

The machine is designed to be as real-life as possible. Anyway, You will find also a bunch of ctf style challanges, it's important to have some encryption knowledge.

You need to have enough information about Linux enumeration and encryption for privileges escalation.

About the VM:

Just download, extract and load the .vmx file in VMware Workstation (tested on VMware Workstation 15.x.x)

The adapter is currently NAT, networking is configured for DHCP and IP will get assigned automatically

Contact:

You can contact me on Hack the box (https://www.hackthebox.eu/profile/232477) or by email ([email protected]) for hints!