π―Skills Assessment Scenarios
π― Skills Assessment - Attacking Common Services
π― Overview
π Phase 1: Service Discovery & Enumeration
Initial Nmap Scan
# HTB Academy Skills Assessment - Initial reconnaissance
nmap -A 10.129.203.7
Starting Nmap 7.92 ( https://nmap.org ) at 2022-11-27 13:54 GMT
Nmap scan report for 10.129.203.7
Host is up (0.014s latency).
Not shown: 993 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
21/tcp open ftp
| fingerprint-strings:
| GenericLines:
| 220 Core FTP Server Version 2.0, build 725, 64-bit Unregistered
| Command unknown, not supported or not allowed...
| Command unknown, not supported or not allowed...
| NULL:
|_ 220 Core FTP Server Version 2.0, build 725, 64-bit Unregistered
|_ssl-date: 2022-11-27T13:56:03+00:00; 0s from scanner time.
25/tcp open smtp hMailServer smtpd
| smtp-commands: WIN-EASY, SIZE 20480000, AUTH LOGIN PLAIN, HELP
|_ 211 DATA HELO EHLO MAIL NOOP QUIT RCPT RSET SAML TURN VRFY
80/tcp open http Apache httpd 2.4.53 ((Win64) OpenSSL/1.1.1n PHP/7.4.29)
| http-title: Welcome to XAMPP
|_Requested resource was http://10.129.203.7/dashboard/
|_http-server-header: Apache/2.4.53 (Win64) OpenSSL/1.1.1n PHP/7.4.29
443/tcp open https Core FTP HTTPS Server
| fingerprint-strings:
| LDAPSearchReq:
|_ 550 Too many connections, please try later...
|_ssl-date: 2022-11-27T13:56:03+00:00; +1s from scanner time.
| ssl-cert: Subject: commonName=Test/organizationName=Testing/stateOrProvinceName=FL/countryName=US
| Not valid before: 2022-04-21T19:27:17
|_Not valid after: 2032-04-18T19:27:17
|_http-server-header: Core FTP HTTPS Server
587/tcp open smtp hMailServer smtpd
| smtp-commands: WIN-EASY, SIZE 20480000, AUTH LOGIN PLAIN, HELP
|_ 211 DATA HELO EHLO MAIL NOOP QUIT RCPT RSET SAML TURN VRFY
3306/tcp open mysql MySQL 5.5.5-10.4.24-MariaDB
| mysql-info:
| Protocol: 10
| Version: 5.5.5-10.4.24-MariaDB
| Thread ID: 10
| Capabilities flags: 63486
| Some Capabilities: IgnoreSigpipes, Support41Auth, Speaks41ProtocolOld, SupportsTransactions, ConnectWithDatabase, FoundRows, LongColumnFlag, Speaks41ProtocolNew, InteractiveClient, SupportsCompression, DontAllowDatabaseTableColumn, IgnoreSpaceBeforeParenthesis, ODBCClient, SupportsLoadDataLocal, SupportsAuthPlugins, SupportsMultipleStatments, SupportsMultipleResults
| Status: Autocommit
| Salt: s`gc>J7s`gdB\'M.>,`#
|_ Auth Plugin Name: mysql_native_passwordKey Services Identified
π€ Phase 2: User Enumeration (SMTP)
Download User Wordlist
SMTP User Enumeration
π Phase 3: Credential Attacks (FTP)
FTP Password Brute Force
π Phase 4: FTP Intelligence Gathering
FTP Access & File Download
Critical Intelligence Analysis
π Phase 5: Exploitation - Method 1 (CoreFTP Directory Traversal)
Vulnerability Research
Exploit Analysis
Web Shell Upload via Directory Traversal
ποΈ Phase 6: Exploitation - Method 2 (MySQL File Write)
MySQL Access
File Write Privilege Check
Web Shell Creation via MySQL
π― Phase 7: Flag Extraction
Web Shell Execution
π Attack Chain Summary
Complete Attack Flow
Services Utilized
Key Learning Points
π§ Tools & Commands Reference
Complete Tool Chain Used
π Related Documentation
π― Skills Assessment - Medium Difficulty
π― Overview - Medium Challenge
π Phase 1: Service Discovery & DNS Enumeration
Initial Nmap Scan
DNS Zone Transfer Attack
π Phase 2: vHost Configuration & Internal Service Discovery
vHost Addition to Local Hosts
Internal FTP Service Discovery
π Phase 3: Anonymous FTP Access & Intelligence Gathering
Anonymous FTP Connection
File System Exploration
π Phase 4: POP3 Credential Attack
Password List Analysis
POP3 Password Brute Force
π§ Phase 5: POP3 Email Access & SSH Key Extraction
POP3 Mail Access
Email Enumeration & Retrieval
π Phase 6: SSH Key Processing & Authentication
SSH Key Formatting
Formatted SSH Private Key
SSH Key Permissions & Access
π― Phase 7: Flag Extraction
Final Flag Retrieval
π Attack Chain Summary - Medium Difficulty
Complete Attack Flow
Services & Techniques Utilized
Advanced Learning Points
π§ Complete Tool Chain - Medium Difficulty
Full Command Reference
π Skills Assessment Comparison
Easy vs Medium Difficulty
Practical CPTS Skills Demonstrated
π― Skills Assessment - Hard Difficulty
π― Overview - Hard Challenge
π Phase 1: Service Discovery & Windows Enumeration
Initial Nmap Scan
Key Services Identified
π Phase 2: SMB Share Enumeration & File Collection
SMB Share Discovery
SMB Share Exploration
User File Collection from IT Department
π Phase 3: Custom Wordlist Creation & Credential Attacks
Password Wordlist Compilation
SMB Credential Attack
π₯οΈ Phase 4: RDP Authentication & SQL Server Access
RDP Connection
SQL Server Connection via Windows Authentication
π€ Phase 5: SQL Server User Impersonation Discovery
Impersonation Privilege Enumeration
π Phase 6: Linked Server Discovery & Exploitation
Linked Server Enumeration
User Impersonation & Linked Server Access
π» Phase 7: xp_cmdshell Enablement & Command Execution
xp_cmdshell Configuration
Administrator Flag Extraction
π Attack Chain Summary - Hard Difficulty
Complete Attack Flow
Advanced Services & Techniques
Expert Learning Points
π§ Complete Tool Chain - Hard Difficulty
Full Command Reference
π Complete Skills Assessment Trilogy
Difficulty Progression Overview
Complete CPTS Skills Matrix
Last updated