Zero to Hoodie Substack

Zero to Hoodie Substack

Share this post

Zero to Hoodie Substack
Zero to Hoodie Substack
Hacking Applied: Another CTF
Copy link
Facebook
Email
Notes
More

Hacking Applied: Another CTF

The Red Team Series continued by Hoodie X

BowTiedCyber's avatar
BowTiedCyber
Nov 16, 2022
∙ Paid
7

Share this post

Zero to Hoodie Substack
Zero to Hoodie Substack
Hacking Applied: Another CTF
Copy link
Facebook
Email
Notes
More
Share

Hey there, Hoodies!

I hope this post finds you well. In my last few articles, I explained hash cracking and hydra. So, it’s time for a Hacking Applied article. In this article, we are going to look at a vulnerable machine from tryhackme. We will break into the machine by using all the methods we have learned so far. Let’s do it:

Preparation

Get the machine here. It’s free so all you need is to create an account to tryhackme. And connect to the VPN. You are all set.

Starting with the nmap. Execute this command 'sudo nmap -A -v <MACHINE_IP>'.

Command Breakthrough

  • sudo = Allow you temporary root permission

  • (-A) = An alias of traceroute, os detection, version detection

  • (-vv) = Sets the nmap output verbosity to level 2

  • (-oN) = Save the output to the specified file

This post is for paid subscribers

Already a paid subscriber? Sign in
© 2025 BowTiedCyber LLC
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share

Copy link
Facebook
Email
Notes
More