Posts

Showing posts from April, 2018

Tr0ll: 2 CTF Walkthrough

Image
Meet the VM here:  https://www.vulnhub.com/entry/tr0ll-2,107/ Hey there! This is the way I followed to find the flag in Tr0ll 2 VM. It is not a difficult thing. As I guess, anyone can do it. Let's move on..... Finding the IP address of the Tr0ll VM. Running nmap tool to get an idea about open ports and running services on the machine. According to the nmap result, the target machine runs 3 services. -21 ftp -22 ssh -80 http Finding the common paths on the http web service. Check the robots.txt file to get all the paths. Add all the paths in robots.txt into a text file and run dirb again using it as a dictionary (troll_paths.txt). Four working directories found. There is an image in each one. Nothing else. Get these four images and check md5 values. There is only one image having some different hash value. Run strings command on the image which has a different hash. Browsed to the /y0ur_self page and f...