Skip to main content
  1. Posts/

Fawn

·219 words·2 mins·
Tier0 Starting Point HTB FTP Very Easy
Victor Mwai
Author
Victor Mwai

Security Analyst || CTF player

Isaiah 6:8

Table of Contents

Introduction
#

For this machine we shall be exploiting the ftp service to get the root flag of the machine. However, we will first need to do the following.

  1. Enumeration of the machine
  2. Service discovery
  3. FTP anonymous log in

images.jpg

Enumeration
#

Before enumerating, we shall start by checking if the IP is reachable from our attacking machine by pinging it as shown below.

image.png

After enumeration, we were able to find out that ftp service is up and running as shown below.

image.png

As seen above the host is reachable from our attacking machine. We shall now enumerate the host using nmap using the following syntax as shown below

Nmap -sCV

Furthermore, anonymous log in is allowed hence, we can easily now get our flag and pawn the machine.

FTP Log in
#

After that we can now easily login and get our flag from the server easily as shown below.

image.png

Below as we can see, we have transferred the flag to our machine

image.png

Now we can get the flag and pawn the machine.

image.png

With that we have successfully pawned the machine.

image.png

We have now successfully pawned the machine

Conclusion
#

In this lab we were able to learn that ftp is an insecure service for storing and transmitting of files over the internet, the secure service of it is SFTP.

Related

Meow
·401 words·2 mins
Tier0 Starting Point HTB Very Easy
Meow, meow
Block Chain
·4759 words·23 mins
Block Chain Programming Web3.0 Intro
Web 3.0