CTF Challenges For Beginners | RootMe TryHackMe

preview_player
Показать описание
We covered the basic steps of a penetration testing procedure using a beginner friendly CTF challenge froom TryHackMe named RootMe. it provides a clear, step-by-step demonstration of solving the challenge, focusing on essential penetration testing concepts. It emphasizes the use of common tools, systematic enumeration, and a logical approach to privilege escalation. The CTF is ideal for beginners to strengthen their foundational skills.
**********
Receive Cyber Security Field Notes and Special Training Videos
*******
Writeup
RootMe TryHackMe
*****
Store
Patreon
LinkedIn
Instagram
Google Profile
Twitter
Facebook
****
0:00 - Introduction to the CTF Challenge
0:46 - Challenge Workflow Overview
1:00 - Reconnaissance with Nmap
1:42 - Directory Brute Forcing
2:12 - Exploiting File Upload Vulnerability
10:46 - Establishing a Reverse Shell
13:31 - Privilege Escalation with SUID Binaries
17:26 - Capturing User and Root Flags
19:37 - Conclusion and Recommendations
Рекомендации по теме
Комментарии
Автор

Before I checked out this video I was trying to get around the upload filter by changing the extension to like .exe or .mpg, which the server DID except, but rendered the script useless, but in other challenges this has worked. Was this just to lower the difficulty level for that challenge or are there situations where a shell can have a different extension and still execute?

SAinTIdiVAca
Автор

I'm so annoyed, I made it all the way to the last step but I couldn't figure out why I couldn't get the gtfobins command to work. I never got a stable shell, didn't know that part was necessary. I was trying to do all sorts of stuff with meterpreter and none of it was working. Thanks for the last push.

Jebly_
Автор

i do not understand CTF at all but i find myself with a need to somewhat understand. how would you interpret "b1, b, msb, xy" assuming you have an image to go with it?

bradenspendlove