👾
Sarel.tech
  • Home
  • 🤓Portfolio
    • Tutorials
      • Python
        • Caesar Cipher in Python
    • TryHackMe Write-ups
      • Pickle Rick
      • Net Sec Challenge
    • Cybersecurity
      • Jump Server with PAM
    • Creativity
      • Catholic Cambodia
      • Shimbukai Karate
      • Pink Cube in Desert
  • 👨‍💻Blog
    • On IT
      • ChatGPT
    • On Management
      • Harvard Certificate in School Management and Leadership (CSML)
    • On Cybersecurity
      • NIST CSF2 Guide for K12 schools
        • Govern (GV)
      • BAE CTF 2024
      • Gamifying Cybersecurity Awareness
Powered by GitBook
On this page
  • Background
  • Enumeration
  • HTTP Header
  • Cracking passwords
  • Avoiding IDS
  • Final notes

Was this helpful?

  1. Portfolio
  2. TryHackMe Write-ups

Net Sec Challenge

PreviousPickle RickNextCybersecurity

Last updated 3 years ago

Was this helpful?

This Write up is for the room, which is a part of the Jr Pentester Path of TryHackMe

Background

This room tests your Nmap, Hydra and Telnet abilities and although it is classified as “Medium”, the room is pretty easy if you paid attention to the rest of the rooms in the module.

Enumeration

In order to simplify our workflow, I will save the target IP as a variable with export ip=10.10.102.108. Now we can simply use $ip whenever we want to enter the full IP address.

A simple nmap scan with the -sV switch already enables us to answer five of the questions in one go! Note how Question 2 mentions a port above 10,000, so perhaps we can use the -p- switch as well. So our final command will be: sudo nmap -sV -p- $ip

nmap results

From that one scan we can answer all of the following questions:

  • What is the highest port number being open less than 10,000?

  • There is an open port outside the common 1000 ports; it is above 10,000. What is it?

  • How many TCP ports are open?

  • What is the flag hidden in the SSH server header?

  • We have an FTP server listening on a nonstandard port. What is the version of the FTP server?

Now we only need three more answers.

HTTP Header

telnet $ip 80

This will open the connection, after which we need to request the page with:

GET / HTTP/1.1

and set the host

host: telnet

We will then receive the header containing the flag.

This challenge could also have been completed using Burp Suite instead of Telnet.

Cracking passwords

hydra -L netsecusers.txt -P /usr/share/wordlists/rockyou.txt ftp://$ip:10021

This gives us the passwords of both users.

Once you have the passwords, there are multiple ways to access the files. In this example, I simply pointed my browser to ftp://10.10.102.108:10021 and was promted for a username and password. testing both, you will see that Quinn has the flag. Download and view the file to answer question 7.

Avoiding IDS

The last question asks us to open a website for another challenge. This turns out to be an IDS that checks our nmap scans. If you used the -sV scan earlier, yours should show 100% chance of being detected. Oops.

We can attempt different scan types to try and avoid the IDS. The -sN tag seems to be effective, so we can reset the packet count on the website and run another nmap scan as follows:

sudo nmap -sN $ip

This will trigger the flag on the website.

Final notes

This was a very easy room for which TryHackMe provides ample training in the module. It was interesting to see a simplified view of how the IDS can pick up on an nmap scan, as different kinds of options such as -sS, -f and even -T 1 all got picked up, though some to a lesser extent than others.

I was already familiar with Hydra and Nmap before attempting this challenge, however learning to use Telnet to fetch HTTP headers in lieu of Burp Suite was new to me.

If you paid attention in the room, you can use Telnet to receive an HTTP header

http flag

The next question we can attempt is the ftp passwords for “eddie” and “quinn”. This can be accomplished with Hydra. We can either crack them one by one, similar to how it was done in the room, or if we already know (or read up on) Hydra, we can create a userlist which contains both those usernames. Note that, on this server, ftp is not on the standard port and our command needs to reflect that.

hydra
ftp
ids
🤓
Protocols and Servers
Protocols and Servers 2
Net Sec Challenge
Network Security