Reconaissance
Complete these challenges by going to session.luhack.uk and opening the Attacker Terminal.
Your task is to gain information about an environment that you have gained unauthorised access to. Your collegue has already enumerated the network and found a number of servers to investigate.
You can access each server through it’s hostname. For example, to ping the first server you could run ping server1
.
DO NOT work through these in order, skip around as they are not in order of difficulty.
Server 1
- What web server is running?
- Which URL will upgrade your browser to a more secure version?
- What is the organisation unit for the certificate issuer?
- What is the hostname for the website being served over https?
Server 2
One of your colleagues has previously discovered that this organisation uses luhack.local
as the domain for their intranet.
- What type of server is this?
- What is the version string of the service?
- What is the IP address of their mail server?
- What is the IP address of their file shares?
- Who do I email if I need to report an issue with the authenticity of email I am receiving from their domain?
- What is the super secret and totally secure credential?
Server 3
- What is the fingerprint of this SSH server?
- What is the typical port for SSH?
Server 4
- Is this a UDP or TCP server?
- What is the name of the service that this server provides?
- What is the current version of this service?
Server 5
- What is the software and version of that software running on this server?
- There is a vulnerability in this software, when was it discolsed, according to a popular automated pentesting tool?
- What is the secret character string that enables the vulnerability?
- What is the password for the admin user?
Server 6
- How many ports are open on the server?
- What is the intended hostname of the server?
- What is the IMAP server called?
- What is the SMTP server?
Server 7
- What is the number of the document that specifies the protocol running on the server?
- What is the first name of the CEO?
- Who else is targeting the victim?
Server 8
- What protocol is running on this host?
- This server has been running since 2020 without being updated. What CVE is this server vulnerable to?
Server 9
- What is the version of the user-facing application on this server?
- What tool would make investigating this host much easier?