Scanners
Challenge:
Luciafer started the hack of the Lytton Labs victim by performing a port scan.
Which TCP ports are open on the victim's machine? Enter the flag as the open ports, separated by commas, no spaces, in numerical order. Disregard port numbers >= 16384.
Example: flag{80,110,111,143,443,2049}
Use the PCAP from LYTTON LABS 01 - Monstrum ex Machina.
Solution:
During the Monstrum ex Machina challenge we identified the Luciafer's machine as 192.168.100.106 and the victim's as 192.168.100.103. Using the same Zeek logs generated during that challenge we searched the conn.log for RSTO connection state events (connection established, originator aborted) to the victim's machine.
$ cat conn.log | zeek-cut proto id.orig_h id.resp_h id.resp_p conn_state | grep -F "192.168.100.103" | grep RSTO | sort -u
tcp 192.168.100.106 192.168.100.103 135 RSTO
tcp 192.168.100.106 192.168.100.103 139 RSTO
tcp 192.168.100.106 192.168.100.103 21 RSTO
tcp 192.168.100.106 192.168.100.103 3389 RSTO
tcp 192.168.100.106 192.168.100.103 445 RSTO
The accepted flag was, flag{21,135,139,445,3389}

Leave a comment