Oct. 28, 2023, 3:58 p.m. | 0xViKi

System Weakness - Medium systemweakness.com

Welcome to the Wgel TryHackMe room! In this blog post, we’ll walk through the step-by-step process of gaining root access to the target machine. Let’s get started!

TryHackMe Challenge Link: https://tryhackme.com/room/wgelctf

Reconnaissance — Nmap Scan:

The first step in any hacking endeavor is reconnaissance. We initiated an Nmap scan with the following command to identify open ports and services on the target machine

sudo nmap -sV -sS -A <IP>
Nmap Scan

Our scan revealed two open ports:

  • Port 22 (SSH) …

ctf cybersecurity linux-priv-esc thm-writeup

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Consultant/Senior Consultant – Categoria Protetta L. 68/99

@ BIP | Italy

SoC Security Architect, Platform Architecture

@ Apple | San Diego, California, United States

Cloud Engineer II- SOC Analyst

@ Insight Enterprises, Inc. | Gurugram Gurgaon HR, IN