Kenobi
Last updated
Last updated
Lets run nmap scans to find open ports and what services are running on them
Lets read the file
Lets connect to FTP using Netcat
Lets go to searchsploit and look for exploits on this particular version of FTP
Lets follow the steps they gave in the room to get an initial foothold on the machine
We are logged in, lets read the user flag.
Lets follow the steps