Ck 00 Ctf Walkthrough Part 2
Getting the victim machine IP address Scanning open ports by using the nmap scanner Enumerating the WordPress website Exploiting through Metasploit and getting the Meterpreter connection Enumerating the target system with a limited shell Exploiting a local privilege escalation vulnerability for getting the root In this article, we’ll take further steps to get the root access of the victim machine. The steps which we’ll be covering to get the root access are as follows:...