To start off, hands down the best show ever made. Now onto the box - there are three separate flags to find for this challenge. You’ll see a few times where I go off on trails that prove to not be useful, but I still think it’s important to document the process as a whole. Let’s begin with an nmap scan, host discovery disabled.
As well as being an amusing TV show, the "Brooklyn Nine Nine" CTF proved to be a very straight forward exploit, but still good as a refresher. Let's begin with our nmap scan
Wherever you fall on the "Nick Cage being a great actor" scale, this is an amusing CTF to work through. Besides, Community has already tried to answer that question I think.
To start off, hands down the best show ever made. Now onto the box - there are three separate flags to find for this challenge. You'll see a few times where I go off on trails that prove to not be useful, but I still think it's important to document the process as a whole. Let's begin with an nmap scan, host discovery disabled
This was a genuinely enjoyable CTF to work through, there are a number of different skills that you will need to call on to exploit this. The theme is also amusing for those Rick & Morty fans out there, but let's go ahead and dive into it.
This simple CTF delves into NFS, or Network File System. NFS is probably best described as a way to locally browse through another systems directories and files after connecting to another system via "mounting". On to the box, our initial nmap scan reveals the following service running over port 2049
The following posts will cover material from TryHackMe along the Cyber Defense path. If you want to learn more about the SMB protocol I would highly encourage you to reference the TryHackMe site as they will provide a much more in depth break down of how the protocol works than I will get into here.
This CTF proves relatively straightforward, but there are a few interesting things about it. This is also one of the few HackTheBox CTFs I did, the vast majority are with TryHackMe. Let's begin with our nmap scan