Example Machine
Recon
nmap -sC -sV TARGET_IP
Enumeration
Describe enumeration steps.
Initial Access
Explain how the exploit worked.
Privilege Escalation
Explain the privilege escalation technique.
Lessons Learned
Important takeaways.
nmap -sC -sV TARGET_IP
Describe enumeration steps.
Explain how the exploit worked.
Explain the privilege escalation technique.
Important takeaways.