Start the machine, hack the system, and find the hidden flags to complete this challenge and earn points!
Launch your dedicated machine to begin hacking
This walkthrough explains how to hack the lab and capture the flags. For help with Learning Mode questions, use the Request Hint button next to each question.
A step-by-step guide to solving the challenge and capturing the flags.
This challenge simulates a real-world scenario where you'll exploit vulnerabilities in a Linux system.
/home/user/flag-user.txt/root/flag-root.txtWhy Use Nmap? Nmap helps identify open ports and services on the target machine, revealing potential entry points.
sudo apt update && sudo apt install nmap -y
brew install nmap
Use Nmap to scan the target IP:
nmap -sV -Pn <target-ip>
Command Explanation:
-sV: Probes open ports to determine service/version info-Pn: Treats all hosts as online, skipping host discovery
PORT STATE SERVICE VERSION 23/tcp open telnet
Analysis: This output indicates that port 23 is open and running Telnet, a potential entry point.
Why Try Telnet? With port 23 open, we can attempt to establish a connection. Telnet is often insecure, transmitting data in plaintext.
Connect using:
telnet <target-ip>
You may notice that no password is required to log in as "user". The prompt might look like this:
login: user Welcome to Learning Lab 102! $
Security Implication: The lack of password authentication indicates a significant security weakness.
In Unix-like systems, user files are typically stored in their home directory. Check the contents of /home/user/:
ls /home/user/
Look for a file named "flag-user.txt". To view its contents, use:
cat /home/user/flag-user.txt
The output will be the user flag. Make sure to note it down.
To access root-level files, we need to escalate our privileges. Try switching to the root user:
su root
Deduction Process: In real-world scenarios, we might try common or default passwords. Here, try using "root" as the password.
If successful, your prompt will change to:
#
Security Implication: Weak or default root passwords are a critical vulnerability in any system.
The root user's files are typically in /root/. List the directory contents:
ls /root/
Look for "flag-root.txt". View its contents with:
cat /root/flag-root.txt
The output will be the root flag. Make sure to capture this flag.
Real-World Implications: While this challenge uses simplified scenarios, similar vulnerabilities can exist in poorly secured systems. Always prioritize robust security practices in real environments.
Choose how you want to get started
Choose a username to get started
We've sent a 9-character code to your email