Bolt

Task 1 - Deploy the machine
Task 2 - Reconnaissance
Task 3 - Hack your way into the machine!
3.1 - Find open ports on the machine
command
result
3.2 - What port number has a web server with a CMS running?
3.3 - What is the username we can find in the CMS?
3.4 - What is the password we can find for the username?

3.5 - What version of the CMS is installed on the server? (Ex: Name 1.1.1)

3.6 - There's an exploit for a previous version of this CMS, which allows authenticated RCE. Find it on Exploit DB. What's its EDB-ID?
3.7 - Metasploit recently added an exploit module for this vulnerability. What's the full path for this exploit? (Ex: exploit/....)
3.8 - Set the LHOST, LPORT, RHOST, USERNAME, PASSWORD in msfconsole before running the exploit

3.9 - Look for flag.txt inside the machine.
Last updated
