Good! The first Flag was finally obtained but first I had to decrypt the md5 string: It looked like a base64 string, so I decoded it: So I listened to that port with netcat and nothing… after a few minutes I saw this: So I launched wireshark, then I started reading the packets and I thought: “WTF?” The vm was trying to connect to my Kali VM on port 4444 with tcp protocol. Sometimes the penetration testing can be frustrating and it’s easy to lose your patience! I also tested several other techniques, but the ports remained closed. I launched some nmap commands but there weren’t any open ports. I noticed that the vm’s ip renewed every 900 seconds but it’s not something we should care about. I started from netdiscover to find the vm’s ip There are 11 flags to collect to solve the challenge. The Necromancer boot2root box was created for a recent SecTalks Brisbane CTF competition. Today I’m ready to publish my walkthrough against the vm hosted on vulnhub called The Necromancer 1 by Xerubus.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |