FourandSix:1 walkthrough

Scanning Phase


To know the IP of the target machine we have to scan the network on which target is connected in my case its my local network
Command to scan the local network : arp-scan --local
Victim IP : 192.168.43.136




Now proceeding in scanning phase using nmap
I enumerated info using nmap aggressive scan with ping sweep
Command : nmap -A 192.168.43.136 -Pn
Results : nfs server is active so i tried to gain access to the server.




Gaining access to server as it is open
Command : showmount -e 192.168.43.136
Results : it has the content in /shared and open to everyone




Now i want to see the content of the server so i decided to make directory on my desktop named as Paras so that i can mount the content in this folder
Command : cd Desktop (to change my dir location to Desktop)
Command : mkdir Paras (to make new dir)
Command : mount -t nfs 192.168.43.136:/shared /root/Desktop/Paras
(to mount the content from shared to new dir i.e Paras which is located in /root/Desktop)
To confirm whether the content is copied in Paras or not i just navigate to Paras and list the contents.
Command : ls (to list the content of the dir)
Result : found 2 directories named USB and whoami and 1 .img file




Then i mounted .img file in USB folder to read the contents of the file
Command : mount USB-stick.img USB
Then after navigating to USB folder and on listing the contents i found image files in different formats .
Command : ls (to list the contents)
Result : found image files which are of no use to me




So finally mounted the content from server to whosmi folder present in Paras and explored the content further to get the flag
Command : mount -t nfs 192.168.43.136:/ whoami
Result : i got few folders and one of them is root folder
After navigating to root folder i got the flag as proof.txt and obtained the flag
Command : cat proof.txt (to read the flag)





 




Popular posts from this blog

Calculat3 M3 | CTF Learn

TryHackme: Blue Walkthrough

CTF - Dina : 1.0.1 walkthrough