Brooklyn Nine Nine

Task 1 - Deploy the machine
🎯 Target IP: 10.10.218.233
Create a directory for machine on the Desktop and a directory containing the scans with nmap.
Task 2 - Reconnaissance
I prefer to start recon by pinging the target, this allows us to check connectivity and get OS info.
Sending these three ICMP packets, we see that the Time To Live (TTL) is ~64 secs. this indicates that the target is a *nix system (probably Linux), while Windows systems usually have a TTL of 128 secs.
Task 2 - Find the User flag
We found a good info: ftp-anon: Anonymous FTP login allowed (FTP code 230), but first we check the port 80.
inspecting source code we found this message:
After this, we try to access with ftp
We can use anonymous login (without psw)
In the current directory there's a file: note_to_jake.txt, we get it to read it.
it's another great indication, we know that there's a user: Jake with a weak password.
We use brute force tool: Hydra with parameters: Jake and dictionary (rockyou).
We can use the credentials obtained for ssh access:
Task 3 - Find the Root flag
Now, we need to get root permissions to explore the root folder.
We can use the following command to list SUID files or sudo -l command:
/bin/less stands out, We can use script of this website to became a root, in this case we choose less process: https://gtfobins.github.io/gtfobins/less/
Now, we're root!
Last updated
