March 28, 2024, 5:03 p.m. | Serdar Çatal

System Weakness - Medium systemweakness.com

Difficulty: Medium

As always let’s start with a nmap scan:

nmap -sV -sC <VICTIM_IP> -oN <SCAN_OUTPUT>
“nmap scan result”

There is a web server on port “5001”. It is running flask. let’s have a look at the webpage:

There is a homework page:

Now I get a homework submit page:

Hmm… It navigates me to nowhere. I think it is time for a directory scan:

Okay, her it is:

It is time to prove my professor that I am a …

cybersecurity flask homework nmap page port red team result running scan server start tryhackme tryhackme-walkthrough web web server

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Sr. Staff Firmware Engineer – Networking & Firewall

@ Axiado | Bengaluru, India

Compliance Architect / Product Security Sr. Engineer/Expert (f/m/d)

@ SAP | Walldorf, DE, 69190

SAP Security Administrator

@ FARO Technologies | EMEA-Portugal