【HackTheBox日记】Day1-STARTING POINT

Day1-STARTING POINT

注册账号

前往hackthebox网站,注册一个自己的账号,并登录

连接hackthebox

https://gitee.com/mightyz/huixin/raw/master/1-2022-12-1910:30:16.png

点击账号信息右边,选择Machines→OpenVPN→Download VPN

https://gitee.com/mightyz/huixin/raw/master/1-2022-12-1910:31:47.png

下载完成后,前往路径下,打开终端,执行命令

openvpn starting_point_Yokimiya.ovpn

https://gitee.com/mightyz/huixin/raw/master/1-2022-12-1910:34:37.png

当出现Initialization Sequence Completed 时候,说明连接完毕

STARTING POINT

连接成功后,可以创建机器,拿到IP。接下来是回答一些小问题。

**Task 1**

What does the acronym VM stand for?

Virtual Machine

**Task 2**

What tool do we use to interact with the operating system in order to issue commands 
via the command line, such as the one to start our VPN connection? It's also known as a 
console or shell.

Terminal

**Task 3**

What service do we use to form our VPN connection into HTB labs?

OpenVPN

**Task 4**

What is the abbreviated name for a 'tunnel interface' in the output of your VPN 
boot-up sequence output?

tun

**Task 5**

What tool do we use to test our connection to the target with an ICMP echo request?

ping

**Task 6**

What is the name of the most common tool for finding open ports on a target?

nmap

**Task 7**

What service do we identify on port 23/tcp during our scans?

telnet

**Task 8**

What username is able to log into the target over telnet with a blank password?

root

拿flag

拿到之前的IP,使用nmap进行扫描

https://gitee.com/mightyz/huixin/raw/master/1-2022-12-1910:44:46.png

开放了, 23端口,服务是telnet远程登陆,直接登录root/root ,成功进入,拿到flag

https://gitee.com/mightyz/huixin/raw/master/1-2022-12-1910:46:46.png

posted @ 2022-12-19 10:50  灰心爷爷  阅读(101)  评论(1编辑  收藏  举报