Kenobi

Deploy the vulnerable machine

Lets run nmap scans to find open ports and what services are running on them

Enumerating Samba for shares

Lets read the file

Gain initials access with ProFtpd

Lets connect to FTP using Netcat

Lets go to searchsploit and look for exploits on this particular version of FTP

Lets follow the steps they gave in the room to get an initial foothold on the machine

We are logged in, lets read the user flag.

Privilege Escalation with Path Variable Manipulation

Lets follow the steps

Last updated