Bob 1.0.1: CTF Walkthrough - Security Boulevard

SBN Bob 1.0.1: CTF Walkthrough

In this article, we will learn to solve a Capture the Flag (CTF) challenge which was posted on VulnHub by “c0rruptedb1t.” According to the information given by the author of the challenge, this CTF is not very difficult and does not require advanced exploitation. You can use this link to download the VM and launch it on Virtual Box.

The torrent downloadable URL is also available for this VM; the link is given in the reference section at the end of this article.

For those who are new to CTF challenges and are not aware of this platform, VulnHub is a well-known website for security researchers. It provides users with a method to learn and practice their pentesting skills through a series of challenges in a safe and legal environment.

Please Note: For all of these machines, I have used Oracle Virtual Box to run the downloaded machine. I recommend using Kali Linux as an attacker machine for solving these CTFs. The techniques used are solely for educational purposes, and I am not responsible if listed techniques are used against any other targets.

Walkthrough

After downloading and running this machine in Virtual Box, let’s start by running the netdiscover command to obtain the IP address of the target machine. The command and its output can be seen in the screenshot given below: [CLICK IMAGES TO ENLARGE]

Command Used: << netdiscover >>

As you can see, we have obtained the virtual machine IP address, i.e., 192.168.1.10 (the target machine IP address).

We will be using 192.168.1.11 as the attacker IP address.

Please note: The target and the attacker machine IP address may be different depending on the network configuration.

So we have the target machine IP. The first step is to find (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Nikhil Kumar. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/5OC7CiL71C4/