In this video walk-through, we covered finding vulnerabilities in Influx Database in addition to docker exploitation.

Sweettooth Inc. needs your help to find out how secure their system is!.

Get OSCP Certificate Notes

Room Link

Room Answers

Do a TCP portscan. What is the name of the database software running on one of these ports?

What is the database user you find?

What was the temperature of the water tank at 1621346400 (UTC Unix Timestamp)?

What is the highest rpm the motor of the mixer reached?

What username do you find in one of the databases?


The second /root/root.txt
Video Walk-through

About the Author

I create cybersecurity notes, digital marketing notes and online courses. I also provide digital marketing consulting including but not limited to SEO, Google & Meta ads and CRM administration.

View Articles