eJPT - 3.5 CTF Post-Exploitation
CTF 1
Question 1
The file that stores user account details is worth a closer look. (target1.ine.local)
After doing an Nmap scan on the target, we can see that port 22 is open and running libssh for which there is a Metasploit module available to ex...
hmadsec.hashnode.dev4 min read