Please enable JavaScript.
Coggle requires JavaScript to display documents.
d0not5top (2: nc -vv smtp (convert hexadecimal code (found 3rd flag)), 1:…
d0not5top
2: nc -vv smtp
convert hexadecimal code
found 3rd flag
1: reconnaissance
netdiscover
browse ip
nmap -sV ip
dirb
found directories
Ip/control
go to source code
1st flag
js/README.MadBro
binary conversion
2nd flag
3: 2nd flag page
found d0not5topMe.ctf
souce code
found link "FLaR6yF1nD3rz_html"
browse d0not5topMe.ctf/FLar6yF1nD3rz_html
custom Brainfuck encoding
decode
4th flag
another ctf
Megusta@G4M35.ctf
browse
debugger
game.js
G4M35/H3x6L64m3
dirb://g4m35.ctf/h3x6l64m3
1 more item...
4: exiftool
decode
found hash
Run John Ripper
found password
ssh usr/ip
decode
6th flag
username
5: ssh -i id_rsa
root@ip
found 2 file
./ L45T_fl46.pl 192.168.1.109 444
final flag
Privilege escalation
Mazzamal Aslam Sp19-RIS-026