Command Line Lab Walkthrough

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
21 hours 43 minutes
Difficulty
Intermediate
CEU/CPE
22
Video Transcription
00:01
Welcome to the command line lab walkthrough.
00:05
All right. So first things first, let's open up a terminal.
00:11
There's a hint there Z. S. H. Corrupt history file. I wonder what that could be.
00:16
Flag won the Commander display, etc. Password. So if you want to display it, we can cat it right
00:22
at sea password
00:26
and you'll see flag one here.
00:30
Flag to the commander. Show all running processes. Ps aux.
00:38
Now this may cut you off the
00:42
the terminal window.
00:44
So
00:45
I always like to grab things. Let's grab flag.
00:49
And we see that there we see it in a few places. Flag too.
00:55
The third flag is the flag that deals with when So I talked about Cron tab.
01:00
So you do crunch tab
01:03
E
01:04
and you can see flag to is in there because it's running right? It's running process and flag three.
01:11
You also do Cron tab. L
01:14
and that will show you without having to edit it.
01:18
Alright, hidden in route.
01:23
So if we look we're en route
01:26
and if something's hidden,
01:29
we do L S L A.
01:32
So we see the dot
01:34
means hidden. So if we cat
01:38
flag we see that flag four.
01:42
Flag five is let history be your guide
01:47
history
01:49
And we see in history # four,
01:53
it's like five.
01:56
So that is Lennox. All five flags.
02:01
All right. We are now in Windows.
02:07
So I said use a net
02:10
on your users. So Net users, we should see
02:15
we have net user one. That's us. Right?
02:21
And the comments you find flag number one, that's flag one.
02:24
Fine running services.
02:28
It's a little tricky. You can do task list, but you have to specify S V C.
02:35
And that goes pretty fast. So if you want you can do fine string
02:42
flag.
02:45
And you see it there.
02:46
Spc host is also called flag.
02:51
You can also use power shell on this if you want.
02:58
You can do get
03:00
services.
03:02
Fine string
03:06
flag.
03:09
I didn't like that
03:12
because it's fine service. I think
03:15
there you go. Flag. So another flag
03:20
This one's hidden on someone's desktop. So we can exit out of power shell.
03:23
Now you don't see the PS
03:27
so it's hidden on someone's desktop. Let's try
03:31
User 1's desktop. So I remember d
03:35
with the switch a
03:37
There you go. Flag three. You can also view the file contents by doing flag.txt.
03:46
Flag three.
03:50
This flag three.
03:53
And the recursive director research is flagged for so you can go all the way down
04:00
to the route and do D I R.
04:02
S.
04:03
Flag and we can do a wildcard here. She showed us a bunch of flags.
04:10
So it shows us flag for an app data.
04:18
Now, if you wanted to again, you could do take this
04:27
type
04:30
flag four dot txt this flag for
04:38
All right. So those are all nine flags
Up Next