Hack The Box: Writer
Jump Ahead: Enum – Getting a Foothold – Lateral Movement – User – Root – Resources TL;DR; To solve this machine, we begin by enumerating open ports using nmap – finding ports 22, 80, 139, and 445 open. From the webserver, we find a login form that is vulnerable to SQLi. Exploiting this, we are […]