Explosion (Tier 0)
Last updated
Was this helpful?
Last updated
Was this helpful?
Tier -> 0
Difficult -> Very Easy
OS -> Windows
Tags -> Programming / RDP / Reconnaissance / Weak Credentials
With a little research, I started answering the first questions
Answer: Remote Desktop Protocol
Answer: cli
Answer: gui
Answer: telnet
Answer: nmap
With this and a little research, I answered the next questions
Answer: ms-wbt-server
Answer: /v:
Then I did an exhaustive scan of the ports found to get information about the running services
With this, I answered the next question
Answer: administrator
Once inside, I saw on the Desktop there was a file named flag which seemed to be a text file, so I opened it to look at its content, and with this, I retrieved the root flag
With this, I got the root flag and pwned the machine
Answer: 951fa96d7830c451b536be5a6be008a0
Then I continued doing an initial port scan of the machine using
I observed the RDP protocol was running on port 3389, so I tried to access it using the tool. But as I was only able to provide the IP, it asked for a domain and password which I didn't have. So I tried to log in using common credentials, and when using administrator as username I could log in providing a blank password, gaining remote access to the machine as a privileged user
To learn more about the RDP protocol you can go