-
Creston Airmedia
Sat, 01 May 2021 14:01:13
Device Location: 192.168.10.177 Exploits: https://www.exploit-db.com/exploits/46786 ports: 80, 443
-
Control4 Flag 2
Sat, 24 Apr 2021 12:45:27
Challenge Submit the contents of flag.txt, found in USB storage on the device. Device Control4 Device Location: 192.168.10.174 Port: A bunch Exploit: Default SSH credentials Getting the flag Look through USB devices. didn’t find anything. ~# cd /mnt/media/usb/ /mnt/internal/usb# ls Looking for USB devices ~# dmesg | grep usb <6>[42949373.260000] usbcore: registered new interface driver usbfs <6>[42949373.260000] usbcore: registered new interface driver hub <6>[42949373.260000] usbcore: registered new device driver usb <6>[42949373.…
-
Iotvillage CTF Network Scan
Sat, 24 Apr 2021 10:14:52
Running tried and true nmap. sudo nmap 192.168.10.0/24 Output Nmap scan report for 192.168.10.172 Host is up (0.095s latency). Not shown: 998 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http Nmap scan report for 192.168.10.173 Host is up (0.096s latency). Not shown: 994 closed ports PORT STATE SERVICE 139/tcp open netbios-ssn 445/tcp open microsoft-ds 548/tcp open afp 5000/tcp open upnp 5001/tcp open commplex-link 8383/tcp open m2mservices Nmap scan report for 192.…