AdaniKamal
  • 🇲🇾Selamat Datang
  • CVE-2024-3400 PAN-OS
    • Version Table
    • panos-check.py
  • Script4u
    • Cipher checker
      • CipherChecker.py
    • Nmap & Ciphers
      • nmap-ciphers.py
      • iplist.txt
    • Ping Bulk
      • ping.py
      • hosts.txt
    • Telnet bulk
      • telnet.py
    • purrfect-cipher-scanner
      • cipher-scanner.py
    • speech2text.py
    • SSL Scan
      • ssl-scanner.py
  • Walkthrough
    • CTF - Walkthrough
    • TryHackMe
      • Authentication Bypass
      • HOLO
      • John The Ripper
      • RES
      • ToolsRUs
      • Anonforce
      • RootMe
      • stealthcopter ctf primer1
      • c4ptur3-th3-fl4g
      • Wonderland
      • Bolt
      • CC-Pen Testing
      • CC-Stego
      • CTF collection Vol.1
      • Crack The Hash
      • Easy steganography
      • Web Fundamentals
      • Hydra
      • Lian_Yu
      • NerdHerd
      • OhSINT
      • STEGOsaurus
      • Custom Wordlist
        • Custom Wordlists
        • Custom Wordlists
      • Advent of Cyber 2020
        • Day3 - Evil Elf
        • Day 5 - Ho-Ho-Hosint
        • Day 6 - Data Elf-iltration
        • Day 12 - Elfcryption
        • Day 14 - Unknown storage
    • 3108 CTF 2024 : Kembara Tuah
  • CTF Tool
    • File Header
Powered by GitBook
On this page
  1. Walkthrough
  2. TryHackMe

Anonforce

image
LogoAnonforceTryHackMe

Steps:

  1. nmap

  2. ftp

  • login anonymous

  • User.txt (ftp://10.10.30.141/home/melodias/user.txt)

  1. Look at all file

  • notread file interesting

  • Got 2 file (pgp and asc)

  1. Decrypt pgp

  • need password for asc file

  • use john

  1. Get list of user and password

  • Interested (root)

  • hashcat root

  • root: hikari

  1. ssh

  • ssh root@10.10.239.40

  • ls -al

  • cat root.txt

Download my CherryTree notes for more beautiful and detail walkthrough. Anonforce.ctb

By AdaniKamal

PreviousToolsRUsNextRootMe

Last updated 10 months ago