April 3, 2023, 3:32 p.m. | Ali AK

System Weakness - Medium systemweakness.com

Level: Easy

The domain of Room: ctf boot2root privesc exploit

Tools used here: Nmap, searchsploit, RCE, NC reverse shell, GREP

Phase 1 2: Reconnaissance (Active) & Scanning

First, check if the host is up. I use ICMP Echo Request Scan to check the status of the remote target.

Now, time to check active TCP ports, Services running on that ports, OS, and other helpful information of target for later Phases.

nmap -Pn -sS $ip -T4 -n -v

HTTP server …

amp check cms ctf domain echo enumeration ethical hacking fuel host icmp ignite information installation linux nmap port ports privesc rce reconnaissance request reverse reverse shell scan server service services shell system target tcp tryhackme web security writeup

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Open-Source Intelligence (OSINT) Policy Analyst (TS/SCI)

@ WWC Global | Reston, Virginia, United States

Security Architect (DevSecOps)

@ EUROPEAN DYNAMICS | Brussels, Brussels, Belgium

Infrastructure Security Architect

@ Ørsted | Kuala Lumpur, MY

Contract Penetration Tester

@ Evolve Security | United States - Remote

Senior Penetration Tester

@ DigitalOcean | Canada