Pwned Vulnhub Walkthrough

Pwned vulnhub challenge is an easy boot2root machine. One of the key take away from this machine is how you can escalate your privileges using Dockers. This blog post is about how I exploited this machine and what are the different tools I used to make that happen. Below are the requirements: You can get

Advertisements
Advertisements
Advertisements

JIS-CTF- Jordan Infosec Capture The Flag Challenge – Walkthrough

This article is a walk through on Jorder InfoSec CTF challenge:¬†https://www.vulnhub.com/entry/jis-ctf-vulnupload,228/ This is a basic web challenge consisting of 5 flags. I ran it on Virtualbox with bridged mode. This app doesn’t require kali os. You can do it on windows as well. To find the vulnerable machines through your attacking machine:¬†http://www.anonhack.in/2018/06/part-2-finding-the-ip-address-of-your-victim-in-your-vmware-hacking-lab-network/ Let’s see the

%d bloggers like this: