[StartingPoint][Tier1]Crocodile
Task 1
What Nmap scanning switch employs the use of default scripts during a scan?
(哪些 Nmap 扫描开关在扫描期间使用默认脚本?)
-sC
Task 2
What service version is found to be running on port 21?
发现端口 21 上运行的服务版本是什么?
$ nmap -sC 10.129.222.39 -p 21 -sV
可以看到21端口FTP支持匿名访问
vsftpd 3.0.3
Task 3
What FTP code is returned to us for the “Anonymous FTP login allowed” message?
(对于“允许匿名 FTP 登录”消息,我们会返回什么 FTP 代码?)
230
Task 4
After connecting to the FTP server using the ftp client, what username do we provide when prompted to log in anonymously?
(使用ftp客户端连接到FTP服务器后,当提示匿名登录时,我们输入什么用户名?)
anonymous
Task 5
After connecting to the FTP server anonymously, what command can we use to download the files we find on the FTP server?
(匿名连接到FTP服务器后,我们可以使用什么命令来下载我们在FTP服务器上找到的文件?)
get
Task 6
What is one of the higher-privilege sounding usernames in ‘allowed.userlist’ that we download from the FTP server?
(我们从 FTP 服务器下载的“allowed.userlist”中听起来权限较高的用户名之一是什么?)
ftp>get allowed.userlist
$ cat allowed.userlist
admin
Task 7
What version of Apache HTTP Server is running on the target host?
(目标主机上正在运行什么版本的 Apache HTTP Server?)
$ nmap 10.129.222.39 -p 80 -sV -Pn
Apache httpd 2.4.41
Task 8
What switch can we use with Gobuster to specify we are looking for specific filetypes?
(我们可以在 Gobuster 中使用什么开关来指定我们正在寻找特定的文件类型?)
-x
Task 9
Which PHP file can we identify with directory brute force that will provide the opportunity to authenticate to the web service?
(我们通过爆破目录后,哪个PHP文件是登陆验证页面)
-word.txt- login pass hack s-h4ck13 user manager
$ gobuster dir -u "http://10.129.222.39" -x php -w ./word.txt
login.php
Flag
回忆一下,ftp连接后还有一个password文件,所以这里不是想让我们爆破,而是通过ftp内admin账密登录
c7110277ac44d78b6a9fff2232434d16

![[StartingPoint][Tier1]Crocodile](https://img-blog.csdnimg.cn/img_convert/9d0a20a13252870e2d96b07d88b06171.jpeg)
![[StartingPoint][Tier1]Crocodile](https://img-blog.csdnimg.cn/img_convert/9ca8a6a720fcb1e58dafdbd45df82b83.jpeg)
![[StartingPoint][Tier1]Crocodile](https://img-home.csdnimg.cn/images/20230724024159.png?origin_url=https%3A%2F%2Fimage.3001.net%2Fimages%2F20240405%2F1712298303_660f993f5f13f3deefa3d.png!small&pos_id=img-Eo3Bi6Z0-1712299542423)
![[StartingPoint][Tier1]Crocodile](https://img-blog.csdnimg.cn/img_convert/48c667d2e4ed8d96a8ea4d13dd7764fb.jpeg)
![[StartingPoint][Tier1]Crocodile](https://img-blog.csdnimg.cn/img_convert/c9e6da4122acd62d1219929a30f21e7f.jpeg)
![[StartingPoint][Tier1]Crocodile](https://img-blog.csdnimg.cn/img_convert/82816182fe649e2c98bc7de1da9f4ef3.jpeg)
![[StartingPoint][Tier1]Crocodile](https://img-blog.csdnimg.cn/img_convert/78afb16cc898b511a4cc9fc65e8236aa.jpeg)
![[StartingPoint][Tier1]Crocodile](https://img-blog.csdnimg.cn/img_convert/6c62c0cfcc2cd22cf0e7b34195b44671.jpeg)
![[StartingPoint][Tier1]Crocodile](https://img-blog.csdnimg.cn/img_convert/db5db41de0771c0ddde4ec1956c50d82.jpeg)
![[StartingPoint][Tier1]Crocodile](https://img-blog.csdnimg.cn/img_convert/6a6e016ae303f164f5fb76e63ec0f07b.jpeg)