Anonymous

Task 1 - Deploy the machine
🎯 Target IP: 10.10.32.229
Create a directory for machine on the Desktop and a directory containing the scans with nmap.
Task 2 - Reconnaissance
I prefer to start recon by pinging the target, this allows us to check connectivity and get OS info.
Sending these three ICMP packets, we see that the Time To Live (TTL) is ~64 secs. this indicates that the target is a *nix system (probably Linux), while Windows systems usually have a TTL of 128 secs.
2.1 - Enumerate the machine. How many ports are open?
sudo
run as root
sC
run default scripts
sV
enumerate versions
A
aggressive mode
T4
run a bit faster
oN
output to file with nmap formatting
It looks like there are 4 open ports on the machine: 21, 22, 139, 445.
2.2 - What service is running on port 21?
2.3 - What service is running on ports 139 and 445?
2.4 - There's a share on the user's computer. What's it called?
We can see that the share's name is:
2.5 - Find user flag
Now, we explore others open ports starting with FTP (21):
We see that scripts directory has all permessions, jump in!
Save all them using get command:
Using cat, we can read files:

Focusing on clean.sh file (that have all permissions), we can erase the bucket and put into a reverse shell script (re-uploading it).
We found reverse shell scripts on https://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet, and we save it into a new file with duplicate name: clean.sh:
flag is usually in the path: /home
or we can spawn a bash shell
2.6 - Find root flag
Last updated