Skip to content

Mission 1: Target [IP]

[!important] STATUS: ACTIVE Start Time: [Current Time] Goal: User -> Root/System


1. Reconnaissance

IP: 10.10.x.x OS Prediction: (TTL 128 = Win, 63 = Lin)

Nmap

# Paste scan here

Services

Port Service Version Notes

2. Enumeration (The Hunt)

Web (80/443)

  • [ ] Tech Stack (Wappalyzer)
  • [ ] Gobuster (Directories)
  • [ ] Source Code Review

Other Ports

  • [ ] SMB (crackmapexec)
  • [ ] FTP (Anonymous?)

3. Exploitation (Shell)

Vector: Exploit:

# Proof of access
whoami

4. Privilege Escalation

Current User: Enum Script: winpeas.exe / linpeas.sh

Path to Root: 1. Found vulnerability: 2. Exploitation steps:


5. Loot (Flags)

  • [ ] local.txt:
  • [ ] proof.txt: