HackTheBox : FriendZone

Nmap Results

Port 21 - ftp -> vsftpd 3.0.3
Port 22 - ssh -> OpenSSH 7.6p1
Port 53 - domain
Port 80 - http -> Friend Zone Escape software
Port 139 - smb
Port 443 - ssl/http -> friendzone.red
Port 445 - smb
(dig axfr friendzoneportal.red @10.10.10.123 && dig axfr friendzone.red @10.10.10.123) | grep -i "IN" | awk {'print"" $1'} | sed 's/.$//' | uniq | tr -s "\n" " "

friendzone.red

admin.friendzoneportal.red

uploads.friendzone.red

administrator1.friendzone.red

First User (www-data)

nmap -A -T4 -p 139,445 -Pn --min-rate 2500 -vv --script="smb-enum* and not (brute or dos or fuzz or external or *loris)" 10.10.10.123

Second User (friend)

Root

CTF Player 🚩 || TRYHACKME || HACKTHEBOX || VULNHUB || STUDENT

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store