Flag 2
by shreyas-sriram
Category
Subset of subset of hacking machines challenges
Challenge
Flag 2
We are given a URL - hackit.zh3r0.ml
Solution
Optional: Find IP address of the given domain using ping
Since it is a machine, begin with a full port scan
nmap -T4 -sC -sV -p- hackit.zh3r0.ml
Note: Not sure if I used the right [options], run
nmap --helpfor better understanding and optimisation
This reveals all the open ports and services running on each port. Also notice that the services running are all mixed up.
22/tcp open http
25/tcp filtered smtp
99/tcp open ssh
324/tcp open ftp
4994/tcp open unknown
11211/tcp filtered memcache
FTP port 324is allowed anonymous login- Use
ftp hackit.zh3r0.ml 324to connect - Login with the following credentials
user : anonymous password : - Go into
PASSIVE modeusing commandpass - Use
ls -la, cd, getto enumerate the hidden files, hidden directories and receive the files onto your machine - File
.flagcontains Flag 2
Flag 2: zh3r0{You_know_your_shit}
- Use