Typo 1: VulnHub CTF walkthrough (part 2)
Introduction In the previous article, Part 1 of this CTF, we were able to complete the following steps on the victim machine: Getting the target machine IP address by running the VM Getting open port details by using the Nmap tool Enumerating HTTP port… Continue reading Typo 1: VulnHub CTF walkthrough (part 2)