Simple CTF

  1. Enumeration machine by using Nmap and gobuster.

Continue enumeration to the found subpage /simple.


  1. Going to /install.php and checking some information, found version of CMS.

CMS is Content Management System.


  1. Found an exploit for CMS Made Simple 2.2.8.

Using an exploit to obtain a machine or information needed to obtain it.

We have a username and password.


  1. Log in to ssh and get a first flag.


  1. Privilege escalation.

https://gtfobins.github.io/ - GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.

Follow the instructions on the website and get a root flag.

Done 🎉

Last updated