- Exposed Services
- Critical Vulnerabilities
- Exploitation
TODO: Fill out the information below.
Nmap scan results for each machine reveal the below services and OS details:
$ nmap -sV 192.168.1.110
This scan identifies the services below as potential points of entry:
- Target 1
- Port 22
- Port 80
- WordPress
The following vulnerabilities were identified on each target:
- Target 1
- openssh
- Apace HTTP
- WordPress
The Red Team was able to penetrate Target 1
and retrieve the following confidential data:
- Target 1
-
flag1.txt
:flag1.txt
b9bbcb33e11b80be759c4e84- Exploit Used
- SSH
- ssh [email protected]
- Password: michael
- Exploit Used
-
flag2.txt
:flag2.txt
fc3fd58dcdad9ab23faca6e9a36e581c- Exploit Used
- Open HTTP
- cd /var/www && find -type f -iname flag2
- Exploit Used
-