Capture the Flag(CTF)

      Clawing Through Cyber: Unraveling the Meow Brute Force CTF Lab

      This CTF lab was a an attempt and success to perform a simple brute force attack on a account that was left with a blank password.

      Before starting the brute force attack I needed to ping the target’s IP address to see ensure my packets reach their destination. I ping’d the target here:

      As we can see from the screenshot, 7 packets were successfully transmitted so we can determine that our connection has been formed and is stable.

      Next, I started the scanning process using the
      nmap & -sV script to send requests to target’s ports in hopes of receiving a reply, thus determining if the said port is open or not ,and since some ports are non-standard, I used the service detection flag -sV, to determine the name and description of the identified services as you can see below.

      After running the scan I identified that port 23/tc is in an open state, running the telnet service. After a doinga quick search about what the telnet service is, I was able to discover that telnet is a old service used for remote management of other hosts on the network. Since connection requests through telnet are usually configured with username/password combinations for increased security. Sometimes, due to configuration mistakes, some important accounts can be left with blank passwords forthe sake of accessibility.I used this that knowledge to perform a simple brute force attack.

      I manually inputted t these three basic usernames; admin, administrator, root. The last user name that I manually entered and a blank password worked I was able to login to the system successfully. After successfully login into the system, I knew I could use the LS command to find the flag.

      I then knew that I needed to read the contents and have the hash value displayed of the flag.txt file so I used the the cat command. This give gave me the hash value of b40abdfe23665f766f9c61ecba8a4c19.

      Hi, I’m admin

      Leave a Reply

      Your email address will not be published. Required fields are marked *