Description The factory is hiding things from all of its users. Can you login as Joe and find what they’ve been looking at? https://jupiter.challenges.picoctf.org/problem/44573/ (link) or http://jupiter.challenges.picoctf.org:44573 Solution Go to the link, we see a login page. I read the source code but there were no useful information. I just cliked every buttons and I noticed we … Read More “picoCTF2019 – logon” »
Enumeration Nmap result Check FTP, SMB, and web server are open. FTP Since it allows anonymous FTP login, let’s get into the service. I enumerated directories and found the user.txt from /Users/Public/Desktop. Also, I found other files as well. I don’t know what PRTG is. But I will get these files for later use. HTTP … Read More “Hack the box – machine – Netmon (CVE-2018-9276)” »
Blue is one of the super easy machines. Enumeration Let’s nmap the target machine. Ok, the nmap result told me some useful information. First, we can see the target machine is open for SMB service. Second, the computer’s name is haris-PC. So let’s remember the computer’s name. As a next step, I googled to find … Read More “Hack the box – machine – Blue” »
At a glance, what protocol seems to be suspect in this attack? At first glance, I see many DNS protocols. There seems to be a lot of traffic between our host and another, what is the IP address of the suspect host? I filtered it to only see DNS. When I scrolled it down a … Read More “Hack the box – Sherlocks – Litter” »
Analyzing the auth.log, can you identify the IP address used by the attacker to carry out a brute-force attack? we can easily find it in the log file. 65.2.161.68 The brute force attempts were successful, and the attacker gained access to an account on the server. What is the username of this account? We can … Read More “Hack the box – Sherlocks – Brutus” »