Welcome back to yet another blog on Day 4 task. I am trying to cover all 25 days in my blog so follow me so that you won't miss my blog. Without any further delay, let's move to today's task.
Scanning through the snow
This room is mainly focusing on scanning and some scanning tools. The first question arrives, why is scanning and why do we need it? Scanning is a set of procedures for identifying live hosts, ports, and services, discovering the operating system of the target system, and identifying vulnerabilities and threats in the network. Scanning reveals a lot about your target. There are two types of scanning: passive and active scanning. Passive Scanning involves scanning a network without directly interacting with the target device (server, computer etc.). Passive scanning is usually carried out through packet capture and analysis tools like Wireshark while active scanning scans individual endpoints in an IT network to retrieve more detailed information. The active scan involves sending packets or queries directly to specific assets rather than passively collecting that data by "catching" it in transit on the network's traffic.
In this room, a port scanner nmap is discussed. If you don't know about nmap, just think of it as a port scanner which tells us which port is open, closed or filtered by the firewall. Let's move to today's task.
Question1
To answer this question, we need to use nmap. The most basic command for nmap is nmap <IP address>. But to get more information we use the command nmap -sV -sC <IP address>
Can you see what server is running on this IP address? Look at port 80. Yes, it is an apache server.
Question2
Look at port 22. It is ssh. Do you know the use of ssh? Well, it is used to establish communication between two computers securely to share data.
Question3
First of all, you need to find the smb directory. Enter this location in your file system.
smb://ip address/
When you click on admin directories, it will ask for a username and password. The credentials are given on the task.
Username: ubuntu
Password: S@nta2022
Don't forget to click on the registered user. After that, you will be able to enter your credentials.
Now you can see two files.
Click on the first file and capture the flag.
Question4
Check out another file userlist.txt. You can see the password of santahr.
Question5
They are recommending you to complete the room on nmap.
Congratulations !! we completed this task. New task will be added tomorrow. Till then you can follow me here for upcoming blogs on the advent of cyber 2022. In the end, you will get a certificate from tryhackme for completing this challenge.
Keep learning and keep spreading Knowledge.