EasyPeasy
Practice using tools such as Nmap and GoBuster to locate a hidden directory to get initial access to a vulnerable machine. Then escalate your privileges through a vulnerable cronjob.
Task 1: Enumeration through Nmap
1.1 How many ports are open?
nmap -sT -p 1-65535 10.10.X.X
1.2 What is the version of nginx?
1.3 What is running on the highest port?

Task 2: Compromising the machine
2.1 Using GoBuster, find flag 1.




2.2 Further enumerate the machine, what is flag 2?




2.3 Crack the hash with easypeasy.txt, What is the flag 3?

2.4 What is the hidden directory?


2.5 Using the wordlist that was provided to you in this task crack the hash what is the password?





2.6 What is the password to login to the machine via SSH?



2.7 What is the user flag?



2.8 What is the root flag?







Last updated