1 00:00:00,420 --> 00:00:05,760 In this video we are going to hack into phone machine from the box, which is the second machine and 2 00:00:05,760 --> 00:00:08,610 hack the box dial zero learning bot. 3 00:00:10,660 --> 00:00:13,600 This machine is focused on exploiting FTP. 4 00:00:14,080 --> 00:00:16,750 First of all, open the box dashboard. 5 00:00:17,050 --> 00:00:21,940 Select Connect to the box and download the VPN credentials. 6 00:00:27,710 --> 00:00:28,670 Save this. 7 00:00:31,130 --> 00:00:35,060 Now open the folder where these credentials have saved in download folder. 8 00:00:37,200 --> 00:00:38,970 We'll put the terminal in the same folder. 9 00:00:40,250 --> 00:00:43,610 Then use the command sudo openvpn and the file name. 10 00:00:48,090 --> 00:00:51,210 And you will be connected to the walks in connection. 11 00:00:53,220 --> 00:00:54,360 But another terminal. 12 00:00:56,460 --> 00:01:01,760 Will I have config command to check whether you are connected or not and you can see the tunnel zero 13 00:01:01,770 --> 00:01:03,000 interface available. 14 00:01:04,060 --> 00:01:06,340 Now go back to check the box website. 15 00:01:07,390 --> 00:01:08,590 Ernst Born the Machine. 16 00:01:10,320 --> 00:01:12,000 It may take a while to start. 17 00:01:14,310 --> 00:01:16,170 Just copy the target machine IP. 18 00:01:21,940 --> 00:01:25,060 And now let's just run an nmap scan against the machine. 19 00:01:27,100 --> 00:01:31,120 I have used PT five and minimum rate 500 to speed up the process. 20 00:01:32,090 --> 00:01:34,670 Dash B is verbose cab and dash. 21 00:01:34,940 --> 00:01:41,570 Dash is going to check for all available ports on the machine and maps can take a while to complete. 22 00:01:42,520 --> 00:01:46,360 And it is outputting the information as soon as it gets it. 23 00:01:46,660 --> 00:01:51,760 For example, we can see that Port 21 is open on the machine, which is FTP port. 24 00:01:52,850 --> 00:01:58,920 Now, while Nmap is conducting the scan, we can go back to the box website and try to answer some questions. 25 00:01:58,940 --> 00:02:03,080 So the first question is what does the acronym FTP stand for? 26 00:02:03,530 --> 00:02:05,720 Which is file transfer protocol. 27 00:02:10,440 --> 00:02:11,520 To submit the answer. 28 00:02:13,950 --> 00:02:17,100 So the next question is which board does the FTP service listen on? 29 00:02:17,100 --> 00:02:20,850 Usually which is 21, which is also open on our machine. 30 00:02:24,330 --> 00:02:24,510 No. 31 00:02:24,510 --> 00:02:27,240 The third question is what is the skewed version of FPTP? 32 00:02:27,270 --> 00:02:28,590 It is pure FPTP. 33 00:02:34,780 --> 00:02:40,870 So the next question is which command is used to send an ICMP request to test the connection to a target? 34 00:02:41,730 --> 00:02:42,720 Which is the pink command. 35 00:02:42,870 --> 00:02:49,080 Let's just try to first do it, open another terminal and try to ping the IP address. 36 00:02:50,350 --> 00:02:53,530 And you can see that we do have a connectivity to our machine. 37 00:02:58,850 --> 00:03:00,530 So also it would be. 38 00:03:03,420 --> 00:03:04,530 Click, submit answer. 39 00:03:07,450 --> 00:03:11,610 You know, the next question is from your skills, which version the FTP is running on the target. 40 00:03:11,610 --> 00:03:16,500 For this, we need our scan results and in the next question it is asking for OS type. 41 00:03:16,500 --> 00:03:18,180 So let's go back to our scan. 42 00:03:22,500 --> 00:03:24,270 Well, now our scan has completed. 43 00:03:25,330 --> 00:03:27,220 So let's get the record information. 44 00:03:28,550 --> 00:03:30,640 War machine is running vs ftp. 45 00:03:30,660 --> 00:03:32,360 CD 3.0.3. 46 00:03:32,870 --> 00:03:34,250 Just copy this information. 47 00:03:35,170 --> 00:03:35,800 The answer. 48 00:03:35,810 --> 00:03:37,120 Check the box question. 49 00:03:43,500 --> 00:03:45,540 No, the next question was the OS type. 50 00:03:47,200 --> 00:03:49,180 But we can see that it's Unix. 51 00:03:51,350 --> 00:03:52,970 We copied and pasted. 52 00:04:00,980 --> 00:04:05,870 Now the next question is what is the command we need to run in order to display the FTP client help, 53 00:04:06,050 --> 00:04:07,140 which is FTP. 54 00:04:07,520 --> 00:04:08,010 Edge. 55 00:04:14,750 --> 00:04:14,990 No. 56 00:04:14,990 --> 00:04:16,970 Let's just try to connect with our machine. 57 00:04:18,130 --> 00:04:19,660 Lose the command FTP. 58 00:04:22,180 --> 00:04:24,310 The IP address of the target machine. 59 00:04:25,590 --> 00:04:27,690 Use the username Anonymous. 60 00:04:32,940 --> 00:04:34,290 And give it a blank password. 61 00:04:34,680 --> 00:04:36,990 And you can see that we are connected to our machine. 62 00:04:38,020 --> 00:04:40,420 We can run different commands such as LZ. 63 00:04:43,890 --> 00:04:44,790 Or directory. 64 00:04:47,320 --> 00:04:49,200 And here we have the flag and flag. 65 00:04:49,450 --> 00:04:50,140 Text file. 66 00:04:51,990 --> 00:04:54,420 So let's just answer some check the box questions. 67 00:04:55,390 --> 00:04:57,340 So the username is anonymous. 68 00:05:04,270 --> 00:05:10,030 So the next question is what is the response code of the FTP login successful, which is 230. 69 00:05:13,640 --> 00:05:14,890 Let's just answer it. 70 00:05:23,990 --> 00:05:29,450 So the next question is what is the command used to list down all files, which is RLS the same command 71 00:05:29,450 --> 00:05:31,220 that we use in our Linux? 72 00:05:33,190 --> 00:05:35,500 Download our file, we use the command. 73 00:05:36,450 --> 00:05:38,670 To use the command and download the flag file. 74 00:05:46,230 --> 00:05:48,390 And you can see that our downloaded has started. 75 00:05:49,950 --> 00:05:51,510 Not open the download folder. 76 00:05:57,270 --> 00:05:58,220 Then open the blackboard. 77 00:05:58,260 --> 00:05:59,040 Text file. 78 00:06:02,160 --> 00:06:03,600 And here we have our flag. 79 00:06:04,410 --> 00:06:05,400 Copy the flag. 80 00:06:05,760 --> 00:06:07,380 Go back to check the box. 81 00:06:11,020 --> 00:06:13,090 We used get commands downloaded. 82 00:06:14,100 --> 00:06:14,320 No. 83 00:06:14,520 --> 00:06:15,600 Made the root flag. 84 00:06:25,660 --> 00:06:27,280 And the phone has been pawned. 85 00:06:27,790 --> 00:06:29,420 I hope you like this video. 86 00:06:29,450 --> 00:06:31,150 And see you in the next video.