ReconForce-01.1
in VULNHUB
Today we are doing hackNos: Recon Force (V1.1) VM from Vulnhub. It was designed by Rahul Gehlaut of hackNos series. It is Easy to Intermediate Box. Let’s start.
1. Scanning
To see what services are running in the box we use “nmap” to find out.
nmap -sV -sC -oA scan 192.168.0.7
So we got 3 open ports and It’s running on Ubuntu. We decided to start from 80 ports.
2 Enumeration
We browse the IP address in the browser and Find a Web page. There is a troubleshooting button. that bring login popup.
3 Hidden Directory
To find out the hidden folder we use dirb, this tool gets the hidden folder and files name from the server with status code.
dirb http://192.168.0.7
4 Playing with Login Page
We Try default username and password in troubleshooting login option. Like “admin:: admin”, ”admin::1234567”. But we can’t login by the default credential.
5 FTP Server
Now we move our focus on the “FTP” server. In the “Nmap” output we see that anonymous FTP login is allowed. Let’s try poking with FTP.
We can’t find any file in an anonymous user. But When we try to log in an interesting String is leaked.Security@hackNos.We think it can have some password. So we try to login with this password in the Web login portal.
We successfully log in and find a ping scan where we can ping hosts.So Now We try to find a way to execute command in that input field .