Posted inctf Cybersecurity Tryhackme
RootMe TryHackMe Writeup
This walkthrough covered the essential steps for exploiting vulnerabilities on the RootMe machine, including scanning for open ports, exploiting a web server, gaining a reverse shell, escalating privileges, and ultimately capturing both the user and root flags.