Simple CTF

https://tryhackme.com/room/easyctf

INIT

export easyctf=10.10.150.200
ping $easyctf

echo "10.10.150.200 easyctf.thm" >> /etc/hosts

How many services are running under port 1000?

nmap -T5 -p1-1000 easyctf.thm

What is running on the higher port?

FTP

HTTP

GOBUSTER

CMS Made Simple 2.2.8

What's the CVE you're using against the application?

To what kind of vulnerability is the application vulnerable?

What's the password?

Where can you login with the details obtained?

What's the user flag?

Is there any other user in the home directory? What's its name?

What can you leverage to spawn a privileged shell?

What's the root flag?

Last updated

Was this helpful?