Skip to content

Instantly share code, notes, and snippets.

@algorythm
Last active March 28, 2018 07:54
Show Gist options
  • Save algorythm/9e3ee993cfe7203246c039ed4c45d139 to your computer and use it in GitHub Desktop.
Save algorythm/9e3ee993cfe7203246c039ed4c45d139 to your computer and use it in GitHub Desktop.
Tips for CTF

CTF tips

Recon the server

It is a good idea to start a port scan on the server. A very basic fast way is:

nmap -sS <ip/fqdn>

To get a bit more information use flags for default scripts (-sC), enumerate versions (-sV), output all formats (-oA) at put it in a file called defualt under the directory nmap:

nmap -sC -sV -oA nmap/default <ip/fqdn>

If we see things that might be exploitable, use searchsploit, i.e. for vsftpd:

searchsploit vsftpd
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment