Assessment Methodologies: Vulnerability Assessment CTF 1 — Walkthrough

Assessment Methodologies: Vulnerability Assessment CTF 1 — Walkthrough

Last updated: July 12, 2025

Hi everyone! In this article, we will solve the Assessment Methodologies: Vulnerability Assessment CTF 1 (eJPTv2). I will not share the flags because I don’t want you to copy and paste them, but rather solve it yourself and follow my instructions, so sit back and read!

Flag 1: Explore hidden directories for version control artifacts that might reveal valuable information.

The question gives us a hint that we have to find directories on the website for version control. Git is a famous version control system. So, first of all, do a nmap scan:

nmap -sS -sV target.ine.local
Assessment Methodologies Vulnerability Assessment CTF 1

So, a web server is running on port 80, but we need to enumerate the directories on the web to find the version control directory. So we will do the default script scan on port 80

nmap -sS -sV -p 80 -sC target.ine.local
Assessment Methodologies Vulnerability Assessment CTF 1

So we have found the “/.git” directory. Fire up the web browser and head towards it

Assessment Methodologies Vulnerability Assessment CTF 1

There is the flag!

Assessment Methodologies Vulnerability Assessment CTF 1

Flag 2: The data storage has some loose security measures. Can you find the flag hidden within it?

Now we have to enumerate more on the web server. For this, we will use the “http-enum” script in nmap

nmap -sS -sV -p 80 --script=http-enum target.ine.local
Assessment Methodologies Vulnerability Assessment CTF 1

So by running the script “http-enum” we have got some interesting files, robots.txtphpinfo.phpphpmyadmin, and .git. We have already explored .git, so let’s go to the /phpmyadmin as it is the main hub to manage the Database, and there might be the flag.

Navigate to the /phpmyadmin

Assessment Methodologies Vulnerability Assessment CTF 1

As in the question, “The data storage has some loose security measures”. The data storage usually means MySQL because data is stored in an SQL database, so on the left side there is the “mysql” section, so navigate into it

Assessment Methodologies Vulnerability Assessment CTF 1

hmm… “Secret_info” is interesting, navigate into it

Assessment Methodologies Vulnerability Assessment CTF 1

There is the flag!

Flag 3: A PHP file that displays server information might be worth examining. What could be hidden in plain sight?

Remember the nmap scan, there was a /phpinfo.php file, let’s navigate into it

Assessment Methodologies Vulnerability Assessment CTF 1

Scroll down a little bit.

Assessment Methodologies Vulnerability Assessment CTF 1

Flag 4: Sensitive directories might hold critical informationSearchh carefully for hidden gems.

We explored the “/.git”, “/phpinfo.php”, and “/phpmyadmin”, now the “/robots.txt” remains

/robots.txt file should not be overlooked as sometimes it contains valuable information!

Assessment Methodologies Vulnerability Assessment CTF 1

The “passwords” directory looks interesting. Navigate into it

Assessment Methodologies Vulnerability Assessment CTF 1

Yes! There is the flag

Assessment Methodologies Vulnerability Assessment CTF 1

And there you go! It was pretty easy. See you in the next Challenge!

Good luck hackers

Leave a Comment

Your email address will not be published. Required fields are marked *