Jan. 18, 2024, 2:31 p.m. | dollarboysushil

InfoSec Write-ups - Medium infosecwriteups.com

Link to NullByte: https://www.vulnhub.com/entry/nullbyte-1,126/

Objective:

Get to /root/proof.txt and follow the instructions.

Level:

Basic to intermediate.

Victim IP: 192.168.1.142
Attacker IP (Kali Linux): 192.168.1.128

Reconnaissance

nmap -sC -sV 192.168.1.142
-sC for default scripts,-sV for version enumeration

Looking at the result:
port 80 http
port 111 rpcbind
port 777 ssh

Enumeration

Viewing the website on port 80, we can see image .

There is nothing much here, so the best step from here would be to download this gif and read …

cybersecurity ethical hacking oscp vulnhub

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Data Privacy Manager m/f/d)

@ Coloplast | Hamburg, HH, DE

Cybersecurity Sr. Manager

@ Eastman | Kingsport, TN, US, 37660

KDN IAM Associate Consultant

@ KPMG India | Hyderabad, Telangana, India

Learning Experience Designer in Cybersecurity (f/m/div.) (Salary: ~113.000 EUR p.a.*)

@ Bosch Group | Stuttgart, Germany

Senior Security Engineer - SIEM

@ Samsara | Remote - US