First CTF. What to do after Nmap?

Hi everyone.

My key is inside this machine. I need to gain access to it.

Already ran nmap, but idk what to do with those informations… Can you give me some direction?

Nmap Results

Nmap Scan

#I did it!

Try hack me spoilers!

How realistic is this CTF? I searched for “bookstore rce” at google. I thought I should search for services at ExploitDB (like “apache 2.4” or “SSL 3.6”)

This solution seems very strange in a real scenario. It seems the application have its own exploit, and that will only work for it

READ:   The Truth About Alexa Site Links and How to Get It

Leave a Comment

Your email address will not be published. Required fields are marked *