Feb. 8, 2024, 12:43 p.m. | MEFIRE FILS ASSAN

System Weakness - Medium systemweakness.com

Remote is a good HTB machine to learn about the danger of public sharing of files on a network and use of not upgrade software. Inside this article, I will show you methods I use to pwned this machine.

RECONNAISSANCE

Before start, we have to know some information about the VICTIM machine and one of the best way to do it is a nmap scan

nmap -sC -sV -O TARGET_IP

There is the output of scan

Many ports are open, …

ctf ctf-writeup hackthebox

Cybersecurity Consultant

@ Devoteam | Cité Mahrajène, Tunisia

GTI Manager of Cybersecurity Operations

@ Grant Thornton | Phoenix, AZ, United States

(Senior) Director of Information Governance, Risk, and Compliance

@ SIXT | Munich, Germany

Information System Security Engineer

@ Space Dynamics Laboratory | North Logan, UT

Intelligence Specialist (Threat/DCO) - Level 3

@ Constellation Technologies | Fort Meade, MD

Cybersecurity GRC Specialist (On-site)

@ EnerSys | Reading, PA, US, 19605