This guide is for the steps you should always do when appoarch pentesting a CTF box
A word before you continue
I want to make it clear that i don't own everything here, most of them was copy/paste from other websites that i found helpfull in the quest of knowledge.
Table of Contents
ID | Process | Description |
---|---|---|
1 | Enumeration | - Enumeration is the key and it always will be. - This is the most important part and should always be done correctly and fully and patiently so that the exploit can be done. |
2 | Foothold&Exploit | - This is the step where we take what we found during the enumeration phase into work to attack and exploit the target vulnerability and create a foothold or persistent connection to the target (ideally with RCE - remote code execution). |
3 | Priviledge Escalation | - After we can get into the target system, we gonna find a way to elevate our normal user to root user or admin user of the target system and compromise the target to gain persistent connect and important information. |