Red Team Capstone Challenge TryHackMe
Last updated
Last updated
This is my second time solving this network challenge. The first time was limited time event, and access to the network afterward was closed, preventing me from writing up a detailed walkthrough or collecting further details.
During the initial reconnaissance, the three public-facing servers were scanned using Nmap. Each server was found to be running a web server, which could yield valuable insights. The scan utilized the -sT flag for a TCP connect scan, the -sV flag for version detection, and the -sC flag to run default scripts.
We begin by adding the IP addresses to our hosts file, allowing hostname resolution even if we change subnets. Should the subnet change for any reason, we can simply update the hosts file with the new subnet information.
Upon downloading the Capstone Challenge resources, we receive two files detailing the current password policies and a base password list. Additionally, there’s a list of common tools recommended for use in the challenge. These resources could prove useful as we progress through the tasks.
Next, we set up our access on the e-citizen communication portal using the provided SSH credentials and registered our account. This portal will serve as a platform to demonstrate the compromises by executing specific steps on the compromised hosts.