Member-only story
this is my walk through Easy Peasy room on try hack me.
there is a common methodology to walk through any CTF challenge:
- Enumeration
- Exploitation
- Privilege Escalation
Outlines
How to deal with decrypted text?
- try to decrypt it with Cyber Chef
- if can’t so it’s a hash
- try to crack the hash with with crack station or hashes
- search with the hash in google
- use john to crack the hash.
How to analyse photos?
- use
strings
- use
steghide extract -sf image
- use
exiftool
Enumeration
in this phase we try to discover (open ports, services, and technologies of the target.
we use NMAP to complete this phase.
nmap -sV -Pn 10.10.242.227 -sC -p- -T4 --min-rate 5000
- -Pn: to avoid pinging the target before ping scan.
- -sC: to run basic scripts to enumerate the target.
- -sV: for version scan.
- -p-: to test all ports.
- -T4: to set scan set fast
- — min-rate 5000: to set minimum request per second to 5000.