Terrier CTF [Part 1]: Network Reconnaissance to SSTI: The Methodology Beneath the Exploit
Step 0: Network Address Discovery
The Terrier CTF Boot2Root machine presented an interesting challenge from the start: identifying the machine’s IP address on the local network. While this might seem quite straightforward in theory, the practical rea...
stackunwind.hashnode.dev5 min read