Meow - Very Easy
Tag : Telnet, Protocols, Reconnaissance, Weak Credentials, Misconfiguration
Last updated
Tag : Telnet, Protocols, Reconnaissance, Weak Credentials, Misconfiguration
Last updated
At first you have to connect VPN or starting pwn box on HTB platform to connect their local lab.
If you not familiar with connect to HTB via OpenVPN you can following this instruction Connect HTB VPN using OpenVPN
After connect to local lab then click the "SPAWN MACHINE" button to start Meow box.
After initiating the machine, attempt to establish a connection with the target machine by using the "ping" command along with its IP address to ensure connectivity.
You can stop the ping command by using "Ctrl + C". In the screenshot, it's evident that our machine is connected to the target machine.
Following that, we will employ Nmap to gather additional details about the target machine. Determining the open port will aid in identifying potential vulnerabilities for exploitation.
Nmap is a network scanning tool that helps discover devices and services on a computer network. It provides information about open ports, services, and operating systems, making it useful for network exploration and security auditing.
As we can see the port that open on our target machine is port 23 with telnet services
Telnet is a network protocol that allows one computer to connect to another for text-based communication. It operates over TCP or UDP, often on port 23. While it provides a remote terminal connection, it lacks encryption, making it insecure for sensitive information. SSH is a more secure alternative.
As telnet serves as a "remote terminal connection," it implies the ability to execute commands on the target machine through the network.
Try telnet with target IP Address on our terminal
Telnet requires a login. In this step, consider using standard and essential usernames like admin, administrator, or root. However, the correct username for this machine is "root," and I will input the accurate information for your convenience.
That's all. We can now attempt to execute commands to obtain the flag. Let's start with the 'ls' command to list files in our current directory. Upon finding that 'flag.txt' is present, we can use the 'cat' command to read the flag and obtain the answer.
Virtual Machine
terminal
openvpn
ping
nmap
telnet
root
b40abdfe23665f766f9c61ecba8a4c19