Feb. 22, 2023, 11:02 a.m. | Md Amiruddin

InfoSec Write-ups - Medium infosecwriteups.com

Difficulty : Easy

Flags: There is one flag

DHCP : Enabled
IP Address : Automatically assigned

For this Toppo machine, I used Virtual Box to run the target machine. Kali Linux is the attacker machine for solving this CTF.

The Toppo OVA file can be downloaded here.

Footprinting

As you can see the Toppo machine is powered on ad it shows it’s ip as 10.0.2.12. Now before we begin use ifconfig to find the IP address of your attack …

capture-the-flag cybersecurity ethical hacking machine vulnhub walkthrough writeup

Consultant infrastructure sécurité H/F

@ Hifield | Sèvres, France

SOC Analyst

@ Wix | Tel Aviv, Israel

Information Security Operations Officer

@ International Labour Organization | Geneva, CH, 1200

PMO Cybersécurité H/F

@ Hifield | Sèvres, France

Third Party Risk Management - Consultant

@ KPMG India | Bengaluru, Karnataka, India

Consultant Cyber Sécurité H/F - Strasbourg

@ Hifield | Strasbourg, France