This second episode is relatively easier compared to the 1st episode. Anyhow, I still enjoy much from this challenge. =)
Let's load up our guns and be prepare for coming storm...
Here we found out the target machine's ip address is 192.168.1.110 (Although we know that this target machine is having the same static ip address beforehand, but it is never too much to do more works).
RECON... RECON... and RECON!!
DEEPER... DEEPER... and DEEPER!!
Let's poke into the FTP server with 'anonymous' login and see what we can gain...
Suspicious 'core' file detected with abnormal large file size... let's grab it to our local desktop and do some further inspect...
Ha! Gotcha! Some credentials found on the 'core' file... copy down the important part and let's crack some stuff with the help of John...
That was fast enough, we have the login account for root and another user 'bbanter'...
If you see the error message, 'Host key verification failed'...
Just try to delete the known_hosts file or 'ssh-keygen -R 192.168.1.110', in this case we are trying to connect to the 192.168.1.110...
Escalate our privilege through the bbanter account... ;)
Let's find our flag, which is a encrypted file again...
From the 'copy.sh', we know that the cipher type.
So, let's decrypt the file and we are have reach to the end of the challenge...
No comments:
Post a Comment