Skip to content

Powered By TEKGENX CONSULTING

Netwerk_LABS
  • Home
  • BLUE TEAM
    • MITRE ATT&CK
    • INFOSEC Governance and Regulation
      • NIST
        • IDENTIFY
        • PROTECT
        • DETECT
        • RESPOND
        • RECOVER
      • Risk Management
    • SOC
      • Threat Detection and Incident Response
        • Threat Detection Engineering
        • Threat Hunting
          • Traffic Analysis
        • Splunk
          • Splunk Basics
          • Understanding Log Sources
          • Dashboards and Reports
          • Exploring SPL
          • Incident Handling with Splunk
          • Investigating with Splunk
    • Security+
    • Scripting
      • Bash Scripting
      • Python
      • ZyBER-TOOLS
  • ZyBER-SERIES
    • Wazuh – SIEM and XDR
    • Attack and Defend Active Directory
    • Offensive Testing Enterprise Networks
    • Threat Detection Engineering
    • F5 Local Traffic Manager (LTM)
    • Incident Response and Forensics
    • Red Team Engagements
  • ZyBER-INTEL
  • ZyBER-NEWS
  • Cookie Policy (EU)

walkthrough

Walkthrough – VulnHUB DC-1

by Bharath Narayanasamy

Views: 17Enumeration Nmap scan Nmap scan reveals that the target is running a website based on Drupal CMS on port 80. Newer installs of Drupal by default block access to the CHANGELOG.txt and README.txt files, so we may need to do further enumeration. Although the target is running an older version of Drupal (7), these two files are not present … Read more

Categories VulnLAB, Practical LABS Tags drupal, walkthrough, dc-1, dirtyCOW
© 2025 Netwerk_LABS •

Powered by TekGenX