Simple CTF

https://tryhackme.com/room/easyctf

INIT

export easyctf=10.10.150.200
ping $easyctf

echo "10.10.150.200 easyctf.thm" >> /etc/hosts

How many services are running under port 1000?

nmap -T5 -p1-1000 easyctf.thm
circle-check

What is running on the higher port?

circle-check

FTP

HTTP

GOBUSTER

CMS Made Simple 2.2.8

What's the CVE you're using against the application?

circle-check

To what kind of vulnerability is the application vulnerable?

circle-check

What's the password?

circle-check

Where can you login with the details obtained?

circle-check

What's the user flag?

circle-check

Is there any other user in the home directory? What's its name?

circle-check

What can you leverage to spawn a privileged shell?

circle-check

What's the root flag?

circle-check

Last updated