There are a lot of open ports and services available on the target machine. The command we are using is nmap -p- 192.168.1.21 -sV. For that I have used an nmap full-port scan for this purpose. Our next step is to find the open ports and services available on the victim machine. We found the victim machine’s IP address: 192.168.1.21 (the attacker IP address is 192.168.1.14). On Kali - the attacker machine - I am using this command The netdiscover command output can be seen in the screenshot. Now, the first step is to find out its IP address. Step 1Īfter downloading the file server VM it will be our victim, or we run it in VirtualBox. Note please: The victim and attacker machine IP addresses may be different, as per your network configuration. I am using Kali Linux as an attacker machine for solving this CTF. Please note: For all of these machines, I have used Oracle VirtualBox to run the downloaded VMs. You can check our previous articles for more CTF challenges. So, today we are going to show you can solve the My File Server 1, is a kind of which provides users with vulnerable applications/machines for there practice who has a experience in the field of information security.
0 Comments
Leave a Reply. |