FTP
Nmap discovered a FTP service running on the target port 21
┌──(kali㉿kali)-[~/archive/htb/labs/servmon]
└─$ ftp $IP
Connected to 10.10.10.184.
220 Microsoft FTP Service
name (10.10.10.184:kali): ftp
331 Anonymous access allowed, send identity (e-mail name) as password.
password:
230 User logged in.
Remote system type is Windows_NT.
The FTP server allows anonymous login
ftp> ls
229 Entering Extended Passive Mode (|||49678|)
125 Data connection already open; Transfer starting.
02-28-22 06:35PM <DIR> Users
226 Transfer complete.
ftp> cd Users
250 CWD command successful.
ftp> ls
229 Entering Extended Passive Mode (|||49679|)
125 Data connection already open; Transfer starting.
02-28-22 06:36PM <DIR> Nadine
02-28-22 06:37PM <DIR> Nathan
226 Transfer complete.
There are 2 sub-directories under the Users
directory. They seem to be representing the system users.
it is very much possible that the ftp server is serving c:\Users
ftp> cd Nadine
250 CWD command successful.
ftp> ls
229 Entering Extended Passive Mode (|||49681|)
150 Opening ASCII mode data connection.
02-28-22 06:36PM 168 Confidential.txt
226 Transfer complete.
/Users/Nadine/Confidential.txt
appears to be an important piece of information.
I will get it.
ftp> cd Nathan
250 CWD command successful.
ftp> ls
229 Entering Extended Passive Mode (|||49684|)
125 Data connection already open; Transfer starting.
02-28-22 06:36PM 182 Notes to do.txt
226 Transfer complete.
Nathan has a note.
Confidential.txt
┌──(kali㉿kali)-[~/…/htb/labs/servmon/ftp]
└─$ cat Confidential.txt
Nathan,
I left your Passwords.txt file on your Desktop. Please remove this once you have edited it yourself and place it back into the secure folder.
Regards
Nadine
Confidential.txt
is a note from Nadine to Nathan.
It says that Nadine left Nathan’s Passwords.txt file on his desktop.
She also requests him to remove the file once he edits something himself and places that back into the secure folder.
That’s a lot of information without context for now.
Notes to do.txt
┌──(kali㉿kali)-[~/…/htb/labs/servmon/ftp]
└─$ cat Notes\ to\ do.txt
1) Change the password for NVMS - Complete
2) Lock down the NSClient Access - Complete
3) Upload the passwords
4) Remove public access to NVMS
5) Place the secret files in SharePoint
This to-do list implies that the target machine uses NSClient, NVMS and SharePoint
- nsclient is a monitoring daemon, which was built for Nagios/Icinga/Naemon
- nvms is a management software for surveillance camera
- sharepoint is a web-based collaborative platform