Kenobi

Deploy the vulnerable machine
Lets run nmap scans to find open ports and what services are running on them



Enumerating Samba for shares





Lets read the file



Gain initials access with ProFtpd

Lets connect to FTP using Netcat


Lets go to searchsploit and look for exploits on this particular version of FTP


Lets follow the steps they gave in the room to get an initial foothold on the machine


We are logged in, lets read the user flag.

Privilege Escalation with Path Variable Manipulation

Lets follow the steps






Last updated
Was this helpful?