Challenges: Source (TryHackMe)
In this engagement, the goal was to enumerate and compromise the attached machine to identify the root cause of a service disruption and gain full system control. The initial phase focused on reconnaissance, starting with network scanning and web dir...
sharonjebitok.com3 min read