The post covers a step-by-step guide on how to find four flags in a Capture The Flag (CTF) assessment focused on footprinting and scanning skills. The methods involve using nmap for service enumeration, checking restricted directories via robots.txt, logging into an FTP server anonymously, and accessing MySQL databases using discovered credentials.

4m read timeFrom systemweakness.com
Post cover image

Sort: