Simple CTF
Enumeration machine by using Nmap and gobuster.


Continue enumeration to the found subpage /simple.

Going to /install.php and checking some information, found version of CMS.
CMS is Content Management System.

Found an exploit for CMS Made Simple 2.2.8.

Using an exploit to obtain a machine or information needed to obtain it.


We have a username and password.
Log in to ssh and get a first flag.

Privilege escalation.

https://gtfobins.github.io/ - GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.

Follow the instructions on the website and get a root flag.

Done 🎉
Last updated