I've created a custom-built vulnerable web application designed to take you on a classic exploitation journey: from a simple SQL Injection to Remote Code Execution, and finally, full root access. No complex setup required. All you need is Docker and a single command to launch your own personal hacking playground.
Recommended challenge workflow:
* Identify the SQL Injection vulnerability.
* Obtain a shell through the vulnerable PostgreSQL instance.
* Escalate privileges to gain root access.