Assessment Methodologies: Vulnerability Assessment CTF-1 — eJPT (INE)
嗯,用户让我帮忙总结一篇文章的内容,控制在一百个字以内,而且不需要特定的开头。首先,我需要仔细阅读文章内容,理解其主要观点。 这篇文章是关于eJPT CTF的,重点在于漏洞评估、网络枚举和隐藏信息的发现。作者通过Nmap扫描和Dirb工具进行初始侦察,发现了.git目录并找到了第一个flag。看起来这是一个针对新手的指南,强调方法论和逻辑推理。 接下来,我需要将这些要点浓缩到100字以内。要注意使用简洁的语言,涵盖主要步骤:Nmap扫描、目录枚举、发现.git目录和获取flag。同时,要突出这是个适合新手的CTF练习。 最后,确保总结直接描述内容,不使用任何开头语。这样用户就能快速了解文章的核心内容了。 </think> 文章描述了一次eJPT CTF练习,通过Nmap扫描和目录枚举发现目标服务器的隐藏信息。作者未使用Nessus工具,而是通过Nmap和Dirb工具进行初始侦察,并成功找到.git目录获取第一个flag。 2026-3-27 11:2:13 Author: infosecwriteups.com(查看原文) 阅读量:4 收藏

A beginner-friendly eJPT CTF walkthrough focused on vulnerability assessment, web enumeration, and hidden information discovery

Suraj Apar

Hello everyone! 👋

In this blog, I’ll walk through eJPT CTF (Vulnerability Assessment) and explain how I approached the lab to find all the flags. Instead of sharing answers directly, the focus is on methodology, enumeration techniques, and logical reasoning.

This CTF was fairly easy compared to others, but it’s still a good exercise in spotting common weaknesses and hidden information on a target web server. The goal here is simple: enumerate properly, think logically, and grab the flags.

So, let’s dive into the lab.

Press enter or click to view image in full size

Initial Recon

The lab provided Nessus credentials, but I intentionally did not use Nessus.

First, I kicked off an Nmap scan: nmap target.ine.local -T4 -sS -sV --script=vuln

-T4 — Faster, aggressive scan timing
-sS — TCP SYN (half-open) scan
-sV — Detect service versions
--script=vuln — Run vulnerability detection scripts

I also performed directory enumeration using Dirb:dirb http://target.ine.local

While Nmap was running, I quickly checked the robots.txt file through the browser.

Press enter or click to view image in full size

Nmap Scan

Q1: Explore hidden directories for version control artifacts that might reveal valuable information.

While carefully scrolling through the Nmap results, I noticed that the .git directory was accessible on the web server.

Press enter or click to view image in full size

Nmap Result

I navigated directly to the .git directory.

Press enter or click to view image in full size

Flag 1

And there we go — we get the first flag 🎉


文章来源: https://infosecwriteups.com/assessment-methodologies-vulnerability-assessment-ctf-1-ejpt-ine-f487e0b2cef5?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh