Hackthebox系列 Starting point Tier0 Meow记录

免责声明:本教程仅限学术讨论使用,请勿作用于非法用途!!!如有用于非法用途,本人概不负责。

目录

  • 题目来源
  • 题目
    • TASK 1
    • TASK 2
    • TASK 3
    • TASK 4
    • TASK 5
    • TASK 6
      • NMAP端口扫描
    • TASK 7
      • Telnet访问
    • TASK 8
    • TASK 9
  • 参考

题目来源

Hackthebox Meow,

题目

根据题目以及提示操作

TASK 1

What does the acronym VM stand for?
******* ******e

根据上述提示,答案为Virtual Machine

TASK 2

What tool do we use to interact with the operating system in order to issue commands via the command line, such as the one to start our VPN connection? It's also known as a console or shell.
*******l

根据上述提示,答案为terminal

TASK 3

What service do we use to form our VPN connection into HTB labs?
******n

根据上述提示,答案为open

VPN准备
command: sudo open ‘filename’
出现图示内容即代表成功,不要关闭此bash
因为我在VW Ware虚拟机里操作Kali的,与主机直接网络连接为桥接
Hackthebox系列 Starting point Tier0 Meow记录_第1张图片
不放心可以ifconfig看一下
Hackthebox系列 Starting point Tier0 Meow记录_第2张图片

TASK 4

What is the abbreviated name for a 'tunnel interface' in the output of your VPN boot-up sequence output?
***

根据上述提示,答案为tun

TASK 5

What tool do we use to test our connection to the target with an ICMP echo request?
***g

根据上述提示,答案为ping

TASK 6

What is the name of the most common tool for finding open ports on a target?
***p

根据上述提示,答案为nmap

NMAP端口扫描

发现开放23端口

TASK 7

What service do we identify on port 23/tcp during our scans?
*****t

根据上述提示,答案为telnet

Telnet访问

telnet IP地址

TASK 8

What username is able to log into the target over telnet with a blank password?
***t

TASK 9

SUBMIT FLAG
Submit root flag

基于提示,用户名应该是root
成功登陆后,查看root对应的文件夹内容

找到flag.txt 打印内容 b40abdfe23665f766f9c61ecba8a4c19

参考

hack the box - tier0

你可能感兴趣的:(Hackthebox,网络)