KB-VULN: 3 Vulnhub Writeup

1.) Target Discovery

2.) Port Scanning and Service Detection

3.) SMB Enumeration

4.) HTTP Enumeration

5.) Reverse Shell

6.)Privilege Escalation

--

--

--

Penetration Tester, CTF player, Full time Learner and Part Time Blogger. Twitter :- https://twitter.com/Exploiter_21, Linked :- https://www.linkedin.com/in/sart

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

{UPDATE} でんしゃでかんかん【電車新幹線のりものと遊ぼう】 Hack Free Resources Generator

{UPDATE} Dibujar y Colorear Hack Free Resources Generator

Internet and Cyber Attacks- 1

Cyber Recovery versus Disaster Recovery — What is the Difference?

Don’t give away your data. A few strategies to be in control of your privacy and data.

Mywifiext-local | steps-mywifiext-net

Internet and Cyber Attacks - 2

IDO ANNOUNCEMENT

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Sarthak joshi

Sarthak joshi

Penetration Tester, CTF player, Full time Learner and Part Time Blogger. Twitter :- https://twitter.com/Exploiter_21, Linked :- https://www.linkedin.com/in/sart

More from Medium

THM’s Alfred — Walkthrough

DEVZAT — HackTheBox WriteUp

Hack the Box — Beep Writeup

HackTheBox Unicode Write-Up

Unicode Avatar