[StartingPoint][Tier1]Crocodile

发布于:2024-04-07 ⋅ 阅读:(155) ⋅ 点赞:(0)

Task 1

What Nmap scanning switch employs the use of default scripts during a scan?

(哪些 Nmap 扫描开关在扫描期间使用默认脚本?)

-sC

Task 2

What service version is found to be running on port 21?

发现端口 21 上运行的服务版本是什么?

$ nmap -sC 10.129.222.39 -p 21 -sV

image.png

可以看到21端口FTP支持匿名访问

vsftpd 3.0.3

Task 3

What FTP code is returned to us for the “Anonymous FTP login allowed” message?

(对于“允许匿名 FTP 登录”消息,我们会返回什么 FTP 代码?)

image.png

230

Task 4

After connecting to the FTP server using the ftp client, what username do we provide when prompted to log in anonymously?

(使用ftp客户端连接到FTP服务器后,当提示匿名登录时,我们输入什么用户名?)

anonymous

Task 5

After connecting to the FTP server anonymously, what command can we use to download the files we find on the FTP server?

(匿名连接到FTP服务器后,我们可以使用什么命令来下载我们在FTP服务器上找到的文件?)

get

Task 6

What is one of the higher-privilege sounding usernames in ‘allowed.userlist’ that we download from the FTP server?

(我们从 FTP 服务器下载的“allowed.userlist”中听起来权限较高的用户名之一是什么?)

ftp>get allowed.userlist

外链图片转存失败,源站可能有防盗链机制,建议将图片保存下来直接上传

$ cat allowed.userlist

image.png

admin

Task 7

What version of Apache HTTP Server is running on the target host?

(目标主机上正在运行什么版本的 Apache HTTP Server?)

$ nmap 10.129.222.39 -p 80 -sV -Pn

image.png

Apache httpd 2.4.41

Task 8

What switch can we use with Gobuster to specify we are looking for specific filetypes?

(我们可以在 Gobuster 中使用什么开关来指定我们正在寻找特定的文件类型?)

-x

Task 9

Which PHP file can we identify with directory brute force that will provide the opportunity to authenticate to the web service?

(我们通过爆破目录后,哪个PHP文件是登陆验证页面)

-word.txt-
login
pass
hack
s-h4ck13
user
manager

$ gobuster dir -u "http://10.129.222.39" -x php -w ./word.txt

image.png

login.php

Flag

image.png

回忆一下,ftp连接后还有一个password文件,所以这里不是想让我们爆破,而是通过ftp内admin账密登录

image.png

image.png

image.png

c7110277ac44d78b6a9fff2232434d16


网站公告

今日签到

点亮在社区的每一天
去签到