
Lame
Writeup Scanning target and we get some open ports. We can look at port 21 FTP, we have vsFTPd 2.3.4 and port 445 SMB, we have Samba 3.0.20-Debian. Now try it with Metaploits. We can not exploi...
Writeup Scanning target and we get some open ports. We can look at port 21 FTP, we have vsFTPd 2.3.4 and port 445 SMB, we have Samba 3.0.20-Debian. Now try it with Metaploits. We can not exploi...
SOLUTION Q1: Which is the username of the compromised user used to conduct the attack? (for example: username) We search for LDAP protocol and get the answer. **Q2: What is the Distinguished Nam...
SOLUTION Open pcap file with Wireshark, search for HTTP and we can see some POST method, follow them. We can see lots of base64 strings. What we need to do is decode all of the outputs (blue text...
SOLUTION Using Wireshark to analyze the network. Search for HTTP protocol. We can see there is a Upload File Vulnerability here Follow IP with port 1337 and we get the Base64 string in reverse.
SOLUTION We can see Base64 string in file’s content.
SOLUTION Flag in file’s content.
SOLUTION View the file’s content we can see 4 encoding with Base64. They are in 3 functions below: check_if_operation_is_active() checkExists() 2 in download()
SOLUTION We have 2 files to analyze: bash_history.txt and sshd.log Q1: What is the IP Address and Port of the SSH Server (IP:PORT) Looking at sshd.log we can see this: [2024-01-28 15:24:23] Con...
SOLUTION We need to download the file, open it and we will see a website attached. But we can not open it and see what in there. So we use strings to view file’s content and get Base64 string of...
DESCRIPTION Intelligence units have intercepted a list of numbers. They seem to be used in a peculiar way - the adversary seems to be sending a list of numbers, most of which are garbage, but two o...