KB-VULN: 1 Walk-Through

1.) Target Discovery By Nmap:

2.) Port Scanning From Nmap:

3.) FTP Enumeration:

4.) SSH Enumeration:

4.) Obtaining SSH Shell:

5.) Privilege Escalation:

--

--

--

Penetration Tester, CTF player, Full time Learner and Part Time Blogger. Twitter :- https://twitter.com/Exploiter_21, Linked :- https://www.linkedin.com/in/sart

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

{UPDATE} Guns n' Bottles - The fastest fingers in the west Hack Free Resources Generator

Anuj Goel of Cyware: 5 Things You Need To Know To Optimize Your Company’s Approach to Data Privacy…

Cryptonom Lore Update — Team FUD [3/2/20]

WordPress Hardening Guide — Checklists and best practices.

{UPDATE} Beach Romance Hack Free Resources Generator

Few things to do to improve your Cybersecurity posture

Double Down Thursdays with BBT & $SYA on #Flooztrade

Repelling A Ransomware Attack: Purandar Das of Sotero On The 5 Things You Need To Do To Protect…

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Sarthak joshi

Sarthak joshi

Penetration Tester, CTF player, Full time Learner and Part Time Blogger. Twitter :- https://twitter.com/Exploiter_21, Linked :- https://www.linkedin.com/in/sart

More from Medium

Should teachers allow their students to listen to music in class?

The results to a survey viewed by 128 people but only 63 choose to answer

Bridgeswap

BINOMIAL COEFFICIENTS

Medium Post #2