When the lab is initialized, check the IP address of the target from "internal network targets" section. When scanning the IP address with nmap, use the -Pn flag to skip the ping check (whether the IP address responds), because in this exercise, ping does not work for the target.
Tip: Target the nmap scan to port 3632. This port is not found among the thousand most common ports, so if you only run "nmap -Pn ", the port will not be found.
Search for vulnerability, exploit it, and read the flag from the file /flag.txt


Ready to become an ethical hacker?
Start today.
As a member of Hakatemia you get unlimited access to Hakatemia modules, exercises and tools, and you get access to the Hakatemia Discord channel where you can ask for help from both instructors and other Hakatemia members.