March 28, 2024, 5:03 p.m. | Serdar Çatal

System Weakness - Medium systemweakness.com

Difficulty: Medium

As always let’s start with a nmap scan:

nmap -sV -sC <VICTIM_IP> -oN <SCAN_OUTPUT>
“nmap scan result”

There is a web server on port “5001”. It is running flask. let’s have a look at the webpage:

There is a homework page:

Now I get a homework submit page:

Hmm… It navigates me to nowhere. I think it is time for a directory scan:

Okay, her it is:

It is time to prove my professor that I am a …

cybersecurity flask homework nmap page port red team result running scan server start tryhackme tryhackme-walkthrough web web server

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Salesforce Solution Consultant

@ BeyondTrust | Remote United States

Divisional Deputy City Solicitor, Public Safety Compliance Counsel - Compliance and Legislation Unit

@ City of Philadelphia | Philadelphia, PA, United States

Security Engineer, IT IAM, EIS

@ Micron Technology | Hyderabad - Skyview, India

Security Analyst

@ Northwestern Memorial Healthcare | Chicago, IL, United States

Werkstudent Cybersecurity (m/w/d)

@ Brose Group | Bamberg, DE, 96052