FTP


Nmap discovered a FTP server on the target port 21 The running service is vsftpd 3.0.3

Null Session


┌──(kali㉿kali)-[~/archive/thm/boiler-ctf]
└─$ ftp $IP
Connected to 10.10.124.235.
220 (vsFTPd 3.0.3)
Name (10.10.124.235:kali): anonymous
230 Login successful.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> 

The target FTP server allows anonymous authentication

┌──(kali㉿kali)-[~/archive/thm/boiler-ctf]
└─$ touch test
 
ftp> put test
local: test remote: test
229 Entering Extended Passive Mode (|||46969|)
550 Permission denied.

It doesn’t allow file upload

ftp> ls -a
229 Entering Extended Passive Mode (|||43849|)
150 Here comes the directory listing.
drwxr-xr-x    2 ftp      ftp          4096 Aug 22  2019 .
drwxr-xr-x    2 ftp      ftp          4096 Aug 22  2019 ..
-rw-r--r--    1 ftp      ftp            74 Aug 21  2019 .info.txt
226 Directory send OK.
 
ftp> get .info.txt
local: .info.txt remote: .info.txt
229 Entering Extended Passive Mode (|||46623|)
150 Opening BINARY mode data connection for .info.txt (74 bytes).
100% |**********************|    74        1.90 MiB/s    00:00 ETA
226 Transfer complete.
74 bytes received in 00:00 (0.92 KiB/s)

It contains a single hidden file; .info.txt

┌──(kali㉿kali)-[~/archive/thm/boiler-ctf]
└─$ cat .info.txt
Whfg jnagrq gb frr vs lbh svaq vg. Yby. Erzrzore: Rahzrengvba vf gur xrl!

The .info.txt file contains ambiguous text, possibly encoded

It was encoded using ROT13 The following is the decoded text; Just wanted to see if you find it. Lol. Remember: Enumeration is the key!