Simple web server pentest
During my last year in uni, we took a class on security. One of the assessment was to take control of a machine - some kind of KOTH minus the competition. We worked in pair and every pair had its own machine to take over. Here is a succint breakdown on how I achieved that plus a little bonus at the end. --- I always start by scanning the machine to see what's up. Using nmap: `nmap -Pn (...)