Introduction
In this Post, Let’s See how to CTF Usage from hackthebox and if you have any doubts, comment down below 👇🏾
Usage HTB Writeup — https://shorturl.at/opuCY
Hacking Phases in Usage
Getting into the system initially. Checking open TCP ports using Nmap.Retrieving information from Telnet banners.Looking for vulnerabilities to exploit.Enumerating information through SNMP.Gaining access to a user shell.Obtaining the user flag.Escalating privileges.Using Metasploit for port forwarding.Identifying ways to escalate privileges.Exploiting vulnerabilities like file read to gain access.Obtaining the root flag.