Active (Easy) (WIP)

Description

  • Difficult -> Easy

  • OS -> Windows

  • State -> Retired

  • Tags -> Vulnerability Assessment / Enterprise Network / Active Directory / Security Tools / Authentication / Software & OS exploitation / Default Credentials / Weak Permissions / Anonymous-Guest Access

Write-up

  • I started making an initial port scan using Nmap

nmap -p- -Pn --min-rate 2500 -oN scan.txt 10.129.189.118

  • Then I did an exhaustive scan to learn about the services running on the open ports

nmap 10.129.93.176 -p22,80 -sVC -oN serv_scan.txt

  • ;


  • With that, I got the user flag

Answer: 0ac28aeb5d1e8d1808cdd083961381ad


  • A


  • Finally, I navigated to the /root folder where I found a root.txt file, and reading its content, I got the root flag


  • With that, I got the root flag and pwned the machine

Answer: 8

Last updated