HacktheBox "machine" Meow
Dharmendra Kumar
Cybersecurity Enthusiast | CTF Player | Security Researcher |Jr Penetration tester| VAPT | Data Structures & Algorithms | C & Python Programming
Description
Enumeration is a crucial initial step in penetration testing, where information about a target system is gathered. It involves identifying open ports, services, and potential vulnerabilities to understand the system’s network role. Tools like Nmap are commonly used to scan for these details. The process requires thoroughness, as missing key details can lead to overlooked attack vectors. Successful enumeration provides a solid foundation for further testing and exploitation.
Enumeration
Enumeration After our VPN connection is successfully established, we can ping the target's IP address to see if our packets reach their destination. You can take the IP address of your current target from the Starting Point lab's page and paste it into your terminal after typing in the ping command as illustrated below.
Ananlysis
Step:-1 This nmap command is to run a scan on the 10.129.54.34 IP address and includes the following options:
-Pn: Bypass the ping scan and do port scanning directly, assuming all hosts are live.
-sV: Do service version scanning, which will reveal which services and their versions are running on which ports.
sudo nmap -sV 10.129.54.34
Step:-2 After completing the scan, we discovered that port 23/tcp is open and running the Telnet service, an outdated protocol used for remote network management. A quick search reveals that Telnet typically requires a username and password for security. In this case, when connecting to the target, we were greeted with a Hack The Box banner and prompted to authenticate before proceeding with remote management of the host.
The command telnet 10.129.54.34 is used to establish a Telnet connection to the target machine at the IP address 10.129.54.34 .
Step:-3 The ls command in Linux is used to list the contents of a directory. It's one of the most commonly used commands for navigating the file system.
The cat command in Linux is used to view, concatenate, and manipulate files.
Finally flag are found
Task 1
What does the acronym VM stand for?
Virtual Machine
领英推荐
Task 2
What tool do we use to interact with the operating system in order to issue commands via the command line, such as the one to start our VPN connection? It's also known as a console or shell.
terminal
Task 3
What service do we use to form our VPN connection into HTB labs?
openvpn
Task 4
What tool do we use to test our connection to the target with an ICMP echo request?
ping
Task 5
What is the name of the most common tool for finding open ports on a target?
nmap
Task 6
What service do we identify on port 23/tcp during our scans?
telnet
Task 7
What username is able to log into the target over telnet with a blank password?
root
Submit Flag
Submit root flag
b40abdfe23665f766f9c61ecba8a4c19
Thanks! for Visiting
C ||Java script ||Python ||DSA ||Networking Cyber security Enthusiast
1 个月Good to know!