2022-04-13_Lab 12 - Kenobi - Cyber_Security
Week 12 Lab Kenobi
Task 1:
-
Make sure you’re connected to our network and deploy the machine No answer needed
-
Scan the machine with nmap, how many ports are open? Answer: 7
Task 2:
-
Using the nmap command above, how many shares have been found? Answer: 3
-
Once you’re connected, list the files on the share. What is the file can you see? Answer: log.txt
-
What port is FTP running on? Answer: 21
-
What mount can we see? Answer: /var
Lets get the version of ProFtpd. Use netcat to connect to the machine on the FTP port.
-
What is the version? Answer: 1.3.5
-
How many exploits are there for the ProFTPd running? Answer: 4
-
We know that the FTP service is running as the Kenobi user (from the file on the share) and an ssh key is generated for that user. No Answer Needed
-
We knew that the /var directory was a mount we could see (task 2, question 4). So we’ve now moved Kenobi’s private key to the /var/tmp directory. No Answer Needed.
-
What is Kenobi’s user flag (/home/kenobi/user.txt)? Answer: d0b0f3f53b6caa532a83915e19224899
To search the a system for these type of files run the following: find / -perm -u=s -type f 2>/dev/null
-
What file looks particularly out of the ordinary? Answer: /usr/bin/menu
-
Run the binary, how many options appear? Answer: 3
-
We copied the /bin/sh shell, called it curl, gave it the correct permissions and then put its location in our path. This meant that when the /usr/bin/menu binary was run, its using our path variable to find the “curl” binary.. Which is actually a version of /usr/sh, as well as this file being run as root it runs our shell as root! No Answer Needed
-
What is the root flag (/root/root.txt)? Answer: 177b3cd8562289f37382721c28381f02