Lian_Yu

Task 1: Find the Flags

Deploy the VM and Start the Enumeration.

No answer needed

What is the Web Directory you found?

  • We can scan the target machine using nmap.

  • There are four open ports:

Port
Service

21

ftp

22

ssh

80

http

111

rcpbind

  • Let's use gobuster to brute force the web pages.

  • Let's go to the /island webpage.

  • We can view the page source using CTRL+U.

  • So the username is vigilante.

  • For now, let's conduct a gobuster scan on /island/ using another list.

Answer

what is the file name you found?

  • Let's visit the /island/2100 page and check it's source.

  • Now that we know the file extension is .ticket, we can perform another gobuster scan.

Answer

what is the FTP password?

  • Let's visit the /island/2100/green_arrow.ticket page.

  • Let's decode the string using Cyberchef.

  • So the FTP password is !#th3h00d.

Answer

what is the file name with SSH password?

  • We can now use vigilante as the username and !#th3h00d as the password to login through FTP.

  • Let's look around for important files.

  • We can download these files to our machine using the get command.

  • Let's check out the images.

  • We can see that the Leave_me_alone.png file is not working properly.

  • Let's check its hash dump.

  • So the first 8 characters are wrong. In a PNG file the first 8 characters should be 89 50 4E 47 0D 0A 1A 0A as shown in this image:

  • Let's use hexedit to fix the bytes.

  • The password for something is password.

  • Let's now extract the file in aa.jpg using this password.

  • We can now unzip the ZIP file.

  • Let's read the shado file.

Answer

user.txt

  • We also downloaded the .other_user file from the FTP server. Let's read that.

  • So it seems like M3tahuman is the password for the user slade.

  • Let's try it out.

  • Let's get the flag inside user.txt.

Answer

root.txt

  • Let's check what commands slade can execute with sudo.

  • We can go to GTFOBins to find an exploit.

  • We can now get the root flag.

Answer

Last updated

Was this helpful?