Usage HTB Writeup | HackerHQ

HackerHQ
Apr 13, 2024

--

Introduction

In this Post, Let’s See how to CTF Usage from hackthebox and if you have any doubts, comment down below 👇🏾

Usage HTB Writeup — https://shorturl.at/opuCY

Hacking Phases in Usage

Getting into the system initially. Checking open TCP ports using Nmap.Retrieving information from Telnet banners.Looking for vulnerabilities to exploit.Enumerating information through SNMP.Gaining access to a user shell.Obtaining the user flag.Escalating privileges.Using Metasploit for port forwarding.Identifying ways to escalate privileges.Exploiting vulnerabilities like file read to gain access.Obtaining the root flag.

--

--

HackerHQ
HackerHQ

Written by HackerHQ

We share cyber security Content & Hack the Box Writeups , Checkout our website - hackerhq.tech

No responses yet