May 20, 2025

Bratarina Proving Grounds Write-Up

Proving Grounds Bratarina machine walkthrough

SUMMARY

This write-up covers the Bratarina machine from Offsec’s Proving Grounds, a straightforward Linux machine where a vulnerable mail service led directly to root.

Port 25 ran a vulnerable version of OpenSMTPD. A public exploit for the service was identified and executed, delivering a Python reverse shell payload. The exploit resulted in direct code execution as root, with no privilege escalation step required.


PATH TO FOLLOW

  1. Reconnaissance & OpenSMTPD Version Identification
  2. Public Exploit Execution → Reverse Shell as Root

Due to OffSec’s policy on content sharing, these write-ups will provide hints only rather than full solutions.I know, boring stuff.