![]() Scan open ports by using the Nmap scanner.Get the target machine IP address by running the Netdiscover utility.The summary of the steps required in solving this CTF are given below: The techniques used are solely for educational purposes, and I am not responsible if the listed techniques are used against any other targets. I am using Kali Linux as an attacker machine for solving this CTF. Please note: For all these machines, I have used Oracle VirtualBox to run the downloaded machine. There are a lot of other challenging CTF exercises available on VulnHub and I highly suggest attempting them, as it is a good way to sharpen your skills and learn new techniques in a safe environment. You can download vulnerable machines from this website and try to exploit them. The torrent downloadable URL is also available for this VM and has been added in the reference section.įor those who are not aware of the site, VulnHub is a well-known website for security researchers which aims to provide users with a way to learn and practice their hacking skills through a series of challenges in a safe and legal environment. You can download the machine and run it on VirtualBox. I have provided a downloadable URL for this CTF. You can check my previous articles for more CTF challenges. The target of the CTF is to get the root access of the machine and read the flag files. ![]() As per the description given by the author, this is an easy- to intermediate-level CTF with some rabbit holes. In this article, we will solve a capture the flag (CTF) challenge that was posted on the VulnHub website by an author named Roel.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |