Skip to main content

CTFs Guide

· 2 min read

This guide is for the steps you should always do when appoarch pentesting a CTF box

A word before you continue

I want to make it clear that i don't own everything here, most of them was copy/paste from other websites that i found helpfull in the quest of knowledge.

Table of Contents

IDProcessDescription
1Enumeration- Enumeration is the key and it always will be.
- This is the most important part and should always be done correctly and fully and patiently so that the exploit can be done.
2Foothold&Exploit- This is the step where we take what we found during the enumeration phase into work to attack and exploit the target vulnerability and create a foothold or persistent connection to the target (ideally with RCE - remote code execution).
3Priviledge Escalation- After we can get into the target system, we gonna find a way to elevate our normal user to root user or admin user of the target system and compromise the target to gain persistent connect and important information.