Brooklyn Nine Nine - TryHackMe
![Image](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7_Z0D_XJlPnj6D4qMJFizW_OP4xjTcORx2kyfUUvHFxoudSkg61RhpmMWwdfL2WL-aPxJVChRj0ezl7VHRDZ4T4lBtOCv-wtwY2aCs_VXpid0wrzN-eyAp1DjY3_q1C1wJRyBDmp07vbV/s0/banner.png)
thm What we can learn from this machine? FTP stegcracker GTFObins (less sudo allowed no-password) In this box I’m using two methods to login to our user. Let’s enumerate the machine. Ok then !! let’s run our nmap. # Nmap 7.91 scan initiated Tue Jul 13 09:37:54 2021 as: nmap -sC -sV -A -oN nmap 10.10.34.147 Nmap scan report for 10.10.34.147 Host is up (0.18s latency). Not shown: 997 closed ports PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 3.0.3 | ftp-anon: Anonymous FTP login allowed (FTP code 230) |_-rw-r--r-- 1 0 0 119 May 17 2020 note_to_jake.txt | ftp-syst: | STAT: | FTP server status: | Connected to ::ffff:10.9.4.19 | Logged in as ftp | TYPE: ASCII | No session bandwidth limit | Session timeout in seconds is 300 | Control connection is plain text | Data connections will be plain text | At session startup, client count was 2 | vsFTPd 3.0.3 - secure, fast, stable |_End o