We covered the first part solution of Game of Thrones CTF Vulnhub where we gathered the challenge flags using various active information gathering techniques such as using nmap, anonymoys FTP login and data extraction using exif tool.
The Complete Practical Web Application Penetration Testing Course
We also covered the second part solution of Game of thrones vulnhub Walkthrough where we demonstrated interacting with PostgreSql using psql to extract flags and information.
Video Walkthrough | Part 1
Video Walkthrough | Part 2
Show Comments