H4cked
Task 1 - Starting
Task 2 - Reconnaissance

2.1 - The attacker is trying to log into a specific service. What service is this?

2.2 - There is a very popular tool by Van Hauser which can be used to brute force a series of services. What is the name of this tool?
2.3 - The attacker is trying to log on with a specific username. What is the username?

2.4 - What is the user's password?

2.5 - What is the current FTP working directory after the attacker logged in?

2.6 - The attacker uploaded a backdoor. What is the backdoor's filename?

2.7 - The backdoor can be downloaded from a specific URL, as it is located inside the uploaded file. What is the full URL?

2.8 - Which command did the attacker manually execute after getting a reverse shell?

2.9 - What is the computer's hostname?
2.10 - Which command did the attacker execute to spawn a new TTY shell?
2.11 - Which command was executed to gain a root shell?

2.12 - The attacker downloaded something from GitHub. What is the name of the GitHub project?

2.13 - The project can be used to install a stealthy backdoor on the system. It can be very hard to detect. What is this type of backdoor called?

Task 3 - Hack your way back into the machine
3.1 - Run Hydra (or any similar tool) on the FTP service. The attacker might not have chosen a complex password. You might get lucky if you use a common word list.

3.2 - Change the necessary values inside the web shell and upload it to the webserver

3.3 - Create a listener on the designated port on your attacker machine. Execute the web shell by visiting the .php file on the targeted web server.

3.4 - Become root!
3.5 - Read the flag.txt file inside the Reptile directory
Last updated
