Synced (Tier 0)
Description
Tier -> 0
Difficult -> Very Easy
OS -> Linux
Tags -> Rsync / Protocols / Reconnaissance / Anonymous/Guest Access
Write-up
With a little research, I started answering the first question

Answer: 873
Then I continued doing an initial port scan of the machine using Nmap
nmap 10.129.197.128 -p- -Pn --min-rate 2500 -oN scan.txt

With this, I answered the next question

Answer: 1
Then I did an exhaustive scan of the ports we found to get information about the running service
nmap 10.129.197.128 -p873 -sVC -oN serv_scan.txt

With this and a little research, I answered some questions

Answer: 31

Answer: rsync

Answer: None

Answer: list-only
I found there was a port a service named rsync that with a little research, I found it was a file synchronization application. Also, I found that it was possible to interact with it using the rsync command-line utility. So I tried using it to list the files being shared under this application specifying it was using a daemon to run this service and I saw it was successful
rsync --list-only 10.129.197.128::

I found a public folder so I listed its content where I found a flag.txt file, so I transferred it from the server to my machine and read its content finally finding the root flag
rsync --list-only 10.129.197.128::public
rsync 10.129.197.128::public/flag.txt ./
cat flag.txt



With this, I got the root flag and pwned the machine

Answer: 72eaf5344ebb84908ae543a719830519
Last updated