Raven 2 Ctf walkthrough
Raven 2 CTF Walkthrough In this article we will see a walkthrough of the Raven: 2 virtual machine. Raven2 :Details Download Raven2 : https://www.vulnhub.com/entry/raven-2,269/ VM Description: Raven 2 is an intermediate level boot2root VM. There are four flags to capture. After multiple breaches, Raven Security has taken extra steps to harden their web server to prevent hackers from getting in. Can you still breach Raven? Penetration Methodology: l Network Scanning :arp-scan and nmap. l Directory Brute-force (dirbuster). l Exploiting RCE in PHP version < 5.2. 18 on Exploit-db l Reading database password from the wp-config file. l Searchsploit for MYSQL . l Exploiting UDF file dynamic library vulnerability for MYSQL using exploit -db. l MYSQL Database. l Privilege Escalation . l Getting Root Access . Let’s try to find the IP of this machine using arp-scan or netdiscover. Below, we can see our results: th...