![]() ![]() Download this file using the get command. ftp 192.168.43.8Īfter logging in anonymously, we can see that there is a file todo.txt. Firstly, let’s try enumeration with an anonymous login on FTP. Now we will use Nmap to gain information about the open ports and the services running on the target machine and for this, type the following command : nmap -p- 192.168.43.8įrom the nmap scan, we can see that Port 21, 22, 80 are open, it means we have the FTP, SSH and HTTP services running simultaneously. So, to identify our target we will use the following command: netdiscover The first step is to identify the target. We will be downloading the lab file from this link. Since these labs are available on the Vulnhub Website. This is another Capture the Flag challenge where we have to escalate privileges to find the root flag to complete the challenge. Introducing the In Plain Sight:1 virtual machine, created by “ bzyo_” and is available on Vulnhub. ![]() In today’s article, we will face an Intermediate challenge.
0 Comments
Leave a Reply. |