I downloaded it and I tried to examine it with exif: I looked into webpage’s source code, but there wasn’t anything else but a jpg image. I tried to connect on port 80 but with a big surprise, because I had already tried it before, I viewed this: So I saved it and I thought it was alright to go a step further. It was a number but I couldn’t know what to do with it. I was a little bit confused because I’d never done such a VM, so I thought to try connecting on udp port 666:Īwesome!! I found the second Flag! I came back to decrypter’s webpage and I found the decrypted key: Then in the base64 decoded string I could always see another interesting info below: Good! The first Flag was finally obtained but first I had to decrypt the md5 string: It looked like a base64 string, so I decoded it: So I listened to that port with netcat and nothing… after a few minutes I saw this: So I launched wireshark, then I started reading the packets and I thought: “WTF?” The vm was trying to connect to my Kali VM on port 4444 with tcp protocol. Sometimes the penetration testing can be frustrating and it’s easy to lose your patience! I also tested several other techniques, but the ports remained closed. I launched some nmap commands but there weren’t any open ports. I noticed that the vm’s ip renewed every 900 seconds but it’s not something we should care about. I started from netdiscover to find the vm’s ip There are 11 flags to collect to solve the challenge. The Necromancer boot2root box was created for a recent SecTalks Brisbane CTF competition. Today I’m ready to publish my walkthrough against the vm hosted on vulnhub called The Necromancer 1 by Xerubus.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |