Command Line Lab Walkthrough

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
21 hours 43 minutes
Difficulty
Intermediate
CEU/CPE
22
Video Transcription
00:01
Welcome to the command line lab walkthrough.
00:05
All right. So first things first, let's open up a terminal.
00:11
There's a hint there Z. S. H. Corrupt history file. I wonder what that could be.
00:16
Flag won the Commander display, etc. Password. So if you want to display it, we can cat it right
00:22
at sea password
00:26
and you'll see flag one here.
00:30
Flag to the commander. Show all running processes. Ps aux.
00:38
Now this may cut you off the
00:42
the terminal window.
00:44
So
00:45
I always like to grab things. Let's grab flag.
00:49
And we see that there we see it in a few places. Flag too.
00:55
The third flag is the flag that deals with when So I talked about Cron tab.
01:00
So you do crunch tab
01:03
E
01:04
and you can see flag to is in there because it's running right? It's running process and flag three.
01:11
You also do Cron tab. L
01:14
and that will show you without having to edit it.
01:18
Alright, hidden in route.
01:23
So if we look we're en route
01:26
and if something's hidden,
01:29
we do L S L A.
01:32
So we see the dot
01:34
means hidden. So if we cat
01:38
flag we see that flag four.
01:42
Flag five is let history be your guide
01:47
history
01:49
And we see in history # four,
01:53
it's like five.
01:56
So that is Lennox. All five flags.
02:01
All right. We are now in Windows.
02:07
So I said use a net
02:10
on your users. So Net users, we should see
02:15
we have net user one. That's us. Right?
02:21
And the comments you find flag number one, that's flag one.
02:24
Fine running services.
02:28
It's a little tricky. You can do task list, but you have to specify S V C.
02:35
And that goes pretty fast. So if you want you can do fine string
02:42
flag.
02:45
And you see it there.
02:46
Spc host is also called flag.
02:51
You can also use power shell on this if you want.
02:58
You can do get
03:00
services.
03:02
Fine string
03:06
flag.
03:09
I didn't like that
03:12
because it's fine service. I think
03:15
there you go. Flag. So another flag
03:20
This one's hidden on someone's desktop. So we can exit out of power shell.
03:23
Now you don't see the PS
03:27
so it's hidden on someone's desktop. Let's try
03:31
User 1's desktop. So I remember d
03:35
with the switch a
03:37
There you go. Flag three. You can also view the file contents by doing flag.txt.
03:46
Flag three.
03:50
This flag three.
03:53
And the recursive director research is flagged for so you can go all the way down
04:00
to the route and do D I R.
04:02
S.
04:03
Flag and we can do a wildcard here. She showed us a bunch of flags.
04:10
So it shows us flag for an app data.
04:18
Now, if you wanted to again, you could do take this
04:27
type
04:30
flag four dot txt this flag for
04:38
All right. So those are all nine flags
Up Next
Offensive Penetration Testing

The Offensive Penetration Testing course opens the doors to those wanting to begin a penetration testing career. This course will prepare learners to begin their pentesting career journey by understanding what tools, techniques, and resources are available for someone starting out in offensive penetration testing.

Instructed By