1 minute read

Crocodile

Overview

For this machine, I started with an nmap scan. Port 21 and Port 80 are open and we can also see the services (and version) each port runs.

Nmap Scan

Crucially, this server allows ftp anonymous login, which is fantastic!

Anonymous login

Now that we’ve logged in, let’s explore the system and retrieve the flag. We see two interesting files in our currency directory, which we can download into our machine and view.

The above users and passwords could help us escalate privileges or even log into the HTTP server that we saw open at port 80 (Apache httpd 2.4.41). The web page displayed at port 80 is as shown:

I tried navigating the pages to find any direct path to attacking the server, but it led to nowhere. Even Wappalyzer didn’t help.

Next I attempted to enumerate hidden directories using gobuster (-x filters out unnecessary files). What we’re looking for is an admin panel that can give us a foothold (using the credentials we obtained from ftp).

Gobuster

At last, we found a /login.php page. Let’s try to login (luckily only 4 credentials to attempt!)

Login

We’ve managed to login with admin credentials since we can now see a Server Manager admin panel.

Directories

Let’s retrieve the flag

Flags