Skip to main content
  1. Posts/

Crocodile

·243 words·2 mins·
Tier1 Starting Point HTB Very Easy
Victor Mwai
Author
Victor Mwai

Security Analyst || CTF player

Isaiah 6:8

Table of Contents

Introduction
#

Untitled.jpg

Task 1
#

What Nmap scanning switch employs the use of default scripts during a scan?

image.png

-sC

Task 2
#

What service version is found to be running on port 21?

image.png

vsftpd 3.0.3

Task 3
#

What FTP code is returned to us for the “Anonymous FTP login allowed” message?

image.png

230

Task 4
#

After connecting to the FTP server using the ftp client, what username do we provide when prompted to log in anonymously?

image.png

anonymous

Task 5
#

After connecting to the FTP server anonymously, what command can we use to download the files we find on the FTP server?

image.png

Get command but to download all files once, one can use the command mget as seen above.

Task 6
#

What is one of the higher-privilege sounding usernames in ‘allowed.userlist’ that we download from the FTP server?

image.png

admin

Task 7
#

What version of Apache HTTP Server is running on the target host?

image.png

Apache httpd 2.4.41

Task 8
#

What switch can we use with Gobuster to specify we are looking for specific filetypes?

image.png

-x

Task 9
#

Which PHP file can we identify with directory brute force that will provide the opportunity to authenticate to the web service?

image.png

login.php

After checking, the two files we downloaded, we were adble to get the admin and the password for the as seen as seen below.

image.png

we used the above credentials to log in to the platform and we got our flag.

image.png

Related

Appointment
·255 words·2 mins
Tier1 Starting Point HTB Very Easy
Waiting on the line.
Sequel
·194 words·1 min
Tier1 Starting Point HTB Very Easy
Why did the database administrator break up with the SQL query? Because it had too many joins! 😄
Reedemer
·225 words·2 mins
Tier0 Starting Point HTB Very Easy
Reedeming yourself