Exploitation
After gathering information we discovered an ssh key and that the machine is vulnerable to heartbleed. Lets see if we can find any more information on the system exploiting heartbleed.
Running Exploit


Knowin that this is base64, lets decode it.

Gaining Access

We were able to gain access with uid of hype
Last updated
Was this helpful?