Simple CTF - TryHackMe Problem Solving
1. How many services are running under port 1000? Ans: 2 2. What is running on the higher port? Ans: ssh 3. What's the CVE you're using against the application? Ans: CVE-2019-9053 4. To what kind of vulnerability is the application vulnerable? Ans: sqli 5. What's the password? Ans: secret 6. Where can you login with the details obtained? Ans: ssh 7. What's the user flag? Ans: G00d j0b, keep up! 8. Is there any other user in the home directory? What's its name? Ans: sunbath 9. What can you leverage to spawn a privileged shell? Ans: vim 10. What's the root flag? Ans: W3ll d0n3. You made it! ==================Problem Solving Step =========== 1. First of all openvpn 2. Scan with nmap cmd: nmap -A ip address cmd: ftp ip address cmd: anonymous cmd: ls cmd: cd pub cmd: ls cmd: mget * then: y cmd: bye cmd: less ForMitch.txt cmd: gobuster dir -u http://ip -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt get directory "simple" 3. Go to browser...