Skip to content
This repository has been archived by the owner on Jun 4, 2018. It is now read-only.
Jennings Zhang edited this page Mar 13, 2018 · 1 revision
  1. Discover open port.
root@kali:~# nmap -p 12000-13000 potato.local

Starting Nmap 7.60 ( https://nmap.org ) at 2018-03-13 16:45 EDT
Nmap scan report for potato.local (192.168.0.57)
Host is up (0.000051s latency).
Not shown: 1000 closed ports
PORT      STATE SERVICE
12227/tcp open  unknown

Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds
  1. Password is the MD5 hash of groceries/potato.jpg.
potato@potato:~$ md5sum groceries/potato.jpg
a583c6aa977308e59984b3b33fa907ec  groceries/potato.jpg
  1. Retrieve file from server.
wget --no-check-certificate --user potato --password a583c6aa977308e59984b3b33fa907ec https://potato.local
  1. Uncover the flag.
strings flag_is_in_here.jpg | grep -A 2 -i FLAG
Clone this wiki locally