Overview
- 1-Recon
- 2-Enumeration
- 
attachments 
 
- 
- 3-Exploitation
- 
attachments 
 
- 
- 4-Post_Enumeration
- 5-Privilege_Escalation
- 
attachments 
 
- 
Target
192.168.239.210
Credentials
- zabbix:- breadandbuttereater121(db)
- Admin:- dinosaur(web)
Note
- Do not overly rely on public exploits
- Instead, learn it by reading the documentation of the target software
- Zabbix Scripts Execution could easily be identified if paid enough attention to the web UI
- Because it was accessible all along under the Alerts section
- Zabbix Scripts Execution via API is still likely feasible but more research is required
 
 
- Instead, learn it by reading the documentation of the target software