• (๑>؂•̀๑)
  • Home
  • Blog
  • Tags
  • Categories
  • Projects
  • Search ﹒◌﹒✦

Search

FTP

Found 4 related articles

Back to Tags
  • 2024-12-04

    Vaccine - FTP, PKZIP/MD5 Cracking, SQL Injection via SQLMap, and SUID vi Privesc


    Technical writeup detailing the compromise of the Vaccine machine. Initial access is achieved by exploiting Anonymous FTP to retrieve a password-protected PKZIP file, cracking the PKZIP and subsequent MD5 hashes to gain web credentials. Authentication leads to exploiting a blind SQL Injection vulnerability via SQLMap, gaining an OS shell. Privilege escalation is completed by finding plaintext credentials for SSH access, then exploiting the SUID binary 'vi' with specific permissions via the ':shell' command to achieve a root shell.

    HackTheBox FTP PKZIP-Cracking MD5-Cracking Hashcat SQL-Injection SQLmap PostgreSQL Reverse-Shell SUID-Privilege-Escalation vi-Exploitation Linux-Exploitation
  • 2024-11-20

    Crocodile - FTP Anonymous Login and Credential Disclosure


    Technical writeup detailing the compromise of the Crocodile machine. Initial access is achieved by exploiting the Anonymous FTP login vulnerability on the vsFTPd 3.0.3 service (21/tcp) to disclose files containing credentials (allowed.userlist and allowed.userlist.passwd). Web enumeration via Gobuster reveals a hidden '/login.php' endpoint. The disclosed 'admin' credentials are used to access the web panel and retrieve the flag, completing the box.

    HackTheBox FTP FTP-Anonymous vsFTPd Credential-Disclosure Information-Disclosure Web-Enumeration Gobuster Linux-Exploitation
  • 2024-09-16

    FirstHacking - Exploiting vsftpd 2.3.4 Backdoor (CVE-2011-2523)


    Technical writeup demonstrating the exploitation of the vsftpd 2.3.4 backdoor (CVE-2011-2523) vulnerability on a DockerLabs environment. Methodology covers Nmap service detection, exploit identification via Searchsploit, remote command execution via the FTP service, and achieving immediate root access.

    DockerLabs FTP vsftpd Backdoor CVE-Exploitation Command-Execution Searchsploit Privilege-Escalation
  • 2024-09-04

    Fawn - Exploiting Anonymous FTP Login


    Technical writeup detailing the compromise of the Fawn machine. The methodology focuses on Nmap scanning to identify the exposed FTP service (vsftpd 3.0.3) on port 21, exploiting the 'Anonymous FTP Login Allowed' setting to gain unauthenticated access, and retrieving the flag via standard FTP file transfer protocols.

    HackTheBox FTP Anonymous-Login vsftpd Enumeration File-Transfer