Kenobi
Deploy the vulnerable machine
Lets run nmap scans to find open ports and what services are running on them
Enumerating Samba for shares
Lets read the file
Gain initials access with ProFtpd
Lets connect to FTP using Netcat
Lets go to searchsploit and look for exploits on this particular version of FTP
Lets follow the steps they gave in the room to get an initial foothold on the machine
We are logged in, lets read the user flag.
Privilege Escalation with Path Variable Manipulation
Lets follow the steps
Last updated