all InfoSec news
TRYHACKME: Ignite (writeup)
System Weakness - Medium systemweakness.com
Level: Easy
The domain of Room: ctf boot2root privesc exploit
Tools used here: Nmap, searchsploit, RCE, NC reverse shell, GREP
Phase 1 2: Reconnaissance (Active) & Scanning
First, check if the host is up. I use ICMP Echo Request Scan to check the status of the remote target.
Now, time to check active TCP ports, Services running on that ports, OS, and other helpful information of target for later Phases.
nmap -Pn -sS $ip -T4 -n -vHTTP server …
amp check cms ctf domain echo enumeration ethical hacking fuel host icmp ignite information installation linux nmap port ports privesc rce reconnaissance request reverse reverse shell scan server service services shell system target tcp tryhackme web security writeup