Simple CTF
https://tryhackme.com/room/easyctf
INIT
export easyctf=10.10.150.200
ping $easyctf
echo "10.10.150.200 easyctf.thm" >> /etc/hostsHow many services are running under port 1000?
nmap -T5 -p1-1000 easyctf.thm
What is running on the higher port?

FTP

HTTP

GOBUSTER


What's the CVE you're using against the application?


To what kind of vulnerability is the application vulnerable?

What's the password?

Where can you login with the details obtained?

What's the user flag?

Is there any other user in the home directory? What's its name?

What can you leverage to spawn a privileged shell?
What's the root flag?
Last updated
