Sunteți pe pagina 1din 2

CTF COMMANDS

Nmap

1. Scan all port including non-standard ports such SSH

Ans:

nmap -sV -p- <IP ADDRESS>

2. Connecting to a none standard SSH port

Ans:

ssh levelzero@192.168.10.100 -p 1994

3. Copy file remote using ssh (port: 1994)

scp –P 1994 leve13@192.168.10.100:evidence-packet-analysis-pcap.gz .

PASSWORD FOR ALL LEVELS


level0 > levelzero
level1 > d-kBBzhNcyH4ySgL--@Sm2GYuwzX=K
level2 > qnj535b-35ZBK*%Kr9j$FBCvD9M$f9
level3 > %YbHrsuae7hW4-k&^cHj^!pXfERES5
level4 > tMJRn2*m+!&Y?V&WSgrrQZ@xVg=dwu
level5 > 3&*$CKkLNs@Fx#-7qL%NBWU4wJV4xx
level6 > KDkd*LbcP-!H36^q5FFRwaM9g$?f7h
level7 > LE@vD73J8qdRE9PFun&5^gty?wkm$-
level8 > 5p6WvZmftE-bgLQ7dtv2d2mkG=hmRE
level9 > ^?Wv@+_qpLZsNkNPJM?rLJ83%=2_QL
level10 > fab79c49d9e5ba511a0f2436308e33e85
level11 > T+b!3V&NazSPH+gSm-q^%r?N+nJ4t!
level12 > AtV$&8C23jpVqRG%&yt2pfDuWUCHQF
level13 > Holy Angel University CTF!

for level4's flag


location:cd
/home/level4/gohere/12345/i/9

Command:
for x in `find gohere -type f -print`;
do
file $x;
done

for level10
aes decryption
SN7QbBMusDjlh66pebj14jMAJ6fd+YT0IytF9qqsQ40=
password: HAUCTF

for user ubuntuctf


password: ctfrocks