This small boot2root VM contains multiple remote vulnerabilities and multiple privilege escalation vectors. The validation for this walkthrough usedVirtualBox, which is the recommended platform. It may also work with VMware

There are many walkthroughs of the CTF through out the internet, but I wanted to put my Walkthrough notes. a Video of the CTF Walkthrough will be added later.

The actual challenge can be found:

https://www.vulnhub.com/entry/basic-pentesting-1,216/

or if you’re interested in how I based my Methodology please visit this course on Udemy:

Ethical Hacking Capture the Flag Walkthroughs V1:https://www.udemy.com/course/ethical-hacking-capture-the-flag-walkthroughs/ Look for Professor K

DOWNLOAD Walkthrough