CTF Tr0ll

  1. Discovery
  2. Scanning
    1. netdiscover
    2. nmap
    3. Port 80
    4. Dirbuster
    5. Nikto

Discovery

https://www.vulnhub.com/entry/tr0ll-1,100/

Tr0ll was inspired by the constant trolling of the machines within the OSCP labs.
The goal is simple, gain root and get Proof.txt from the /root directory.
Not for the easily frustrated! Fair warning, there be trolls ahead!
Difficulty: Beginner ; Type: boot2root

Scanning

netdiscover

sudo netdiscover

nmap

nmap -sV -p- 192.168.0.24

Port 80

There is nothing intresting in the source code of this page.
Let’s see what is in the robots.txt.

User-agent:*
Disallow: /secret

…yes

Dirbuster

Too many errors for me, I will search for something else.

Nikto

Nothing intresting on the port 80, I already know for the secret and robot.txt.