THM Writeup: Madness CTF

Startup the target machine and jump into the challenge.I did a Nmap scan against the machine I found 2 open ports. I managed to visit the webserver running and I found a default apache page I did a gobuster scan with common.txt (dirb default wordlist) but couldn’t find much useful information. So I managed to check the source code of […]

THM Writeup: Startup

As always start with a port scan against the target. I used nmap: Now let’s move on to the port 80 HTTP website. Start with a web directory scan to identify the web files/directories. There is a directory called “/files”. http://[Target Ip]/files Here’s what the note says: Huh, Maya might be a potential username. So let’s keep a note of […]