NEW: I'm launching a course for security practitioners
If you're a threat hunter, detection engineer, or incident responder who wants to build your own AI-powered tools (no coding required) - check out "Mastering Agentic AI for Threat Hunting"
→ Join the waitlist for 20% off: https://aionsec.ai/course
---
In this beginner-friendly CTF walkthrough from TryHackMe we will:
- use nmap to enumerate ports/services
- use gobuster to discover hidden directories and files on the web server
- discover login credentials hidden on the pubic web directory
- use this to log into a portal
- execute remote commands from the portal on the web server
- use this to get a reverse shell on target
- on target we discover a sudo -l misconfiguration
- we use this to get root
link to room (it's free!): https://tryhackme.com/room/picklerick
twitter: @faanross
stills: collab faan|ross + dall-e
#cybersecurity #pentesting #ctf