Writeups

Write ups and Walkthroughs about vulnerable machines

View on GitHub

Simple CTF

Back to Tryhackme page


Enumeration

Started emunerating using nmap.

nmap 1

nmap 2

Note : SSH port was not shown at first but after getting stuck on questions , checked walthrough and found it should be ssh.

nmap 3

3 open ports of ftp , http and ssh.


ftp

Logged into ftp and found user name “mitch”. Also says mitch have very weak password.

ftp


Website

website

Website doesn’t show anything interesting.

Started directory enumaration with gobuster.

gobuster

Found /simple directory.

simple page


CVE finding

Checked CMS versions and googled for its exploit.

cve

Downloaded file and started exploit.

CMS made simple

Note : Script didn’t work becuase of my python version. So I checked through walkthrough and got password.


User flag

Got user flag.

user flag


Root flag

User had sudo privelege for vim.

gtfobins vim

root flag


Source