Skip to content

Example Machine

Recon

nmap -sC -sV TARGET_IP

Enumeration

Describe enumeration steps.

Initial Access

Explain how the exploit worked.

Privilege Escalation

Explain the privilege escalation technique.

Lessons Learned

Important takeaways.