Active (Easy) (WIP)
Description
Difficult -> Easy
OS -> Windows
State -> Retired
Tags -> Vulnerability Assessment / Enterprise Network / Active Directory / Security Tools / Authentication / Software & OS exploitation / Default Credentials / Weak Permissions / Anonymous-Guest Access
Write-up
I started making an initial port scan using Nmap
nmap -p- -Pn --min-rate 2500 -oN scan.txt 10.129.189.118

Then I did an exhaustive scan to learn about the services running on the open ports
nmap 10.129.93.176 -p22,80 -sVC -oN serv_scan.txt


;
With that, I got the user flag

Answer: 0ac28aeb5d1e8d1808cdd083961381ad
A
Finally, I navigated to the /root folder where I found a root.txt file, and reading its content, I got the root flag
With that, I got the root flag and pwned the machine

Answer: 8
Last updated