Summary

  • The provided nmap scan shows that three ports are open: FTP (21), SSH (22), and HTTP (80).
  • The machine’s website indicates it acts as a security monitoring dashboard and provides downloadable PCAP files.
  • One such file, found by running Feroxbuster, contains FTP credentials, specifically user ‘nathan’ with password ‘Buck3tH4TF0RM3!‘.
  • These credentials allow login to an FTP directory hosting an SSH key which when imported and used via ssh ‘root@cap.htb’ allows user to gain root permissions and thus complete machine.

By Reju Kole

Original Article