Crocodile writeup

10.129.1.15

Task 1 – What Nmap scanning switch employs the use of default scripts during a scan?

I use to use this command a lot but I ended up just switching to -A instead for nmap scans. 

A: -sC

Task 2 – What service version is found to be running on port 21?

A: vsftpd 3.0.3

Task 3 – What FTP code is returned to us for the “Anonymous FTP login allowed” message?

FTP’d to the machine using anonymous. 

A: 230

Task 4 – After connecting to the FTP server using the ftp client, what username do we provide when prompted to log in anonymously?

A: anonymous

Task 5 – After connecting to the FTP server anonymously, what command can we use to download the files we find on the FTP server?

A: get

Task 6 – What is one of the higher-privilege sounding usernames in ‘allowed.userlist’ that we download from the FTP server?

A: admin

Task 7 – What version of Apache HTTP Server is running on the target host?

From previous scan. 

A: Apache httpd 2.4.41

Task 8 – What switch can we use with Gobuster to specify we are looking for specific filetypes?

I ran gobuster without the specific file type, but I know that is -x.

A: -x

Task 9 – Which PHP file can we identify with directory brute force that will provide the opportunity to authenticate to the web service?

I guess I actually needed to run the scan with -x. I ended up finding this anyway with the last scan at /dashboard as that redirected me here.

A: login.php

Submit root:

I ended up guessing each username and password we found earlier. There is a faster way if these lists were longer but since there was few passwords and we obviously needed to get into admin I just guessed manually.

A: c7110277ac44d78b6a9fff2232434d16

GG

Leave a comment