TryHackMe — Network Services — FTP

Katjah Smith👩🏽‍💻
3 min readFeb 15, 2022

Hey hackers! This blog will be the final walkthrough of the first three-part TryHackMe Network Services lab where I will enumerate and exploit a variety of network services and configurations.

Understanding FTP

What communications model does FTP use?

  • client-server

What’s the standard FTP port?

  • 21

How many modes of FTP connection are there?

  • 2
https://tryhackme.com/room/networkservices

Enumerating FTP

Run an nmap scan of your choice.

How many ports are open on the target machine?

  • 2

What port is ftp running on?

  • 21

What variant of FTP is running on it?

  • vsftpd

Great, now we know what type of FTP server we’re dealing with we can check to see if we are able to login anonymously to the FTP server. We can do this using by typing “ftp [IP]” into the console, and entering “anonymous”, and no password when prompted.

What is the name of the file in the anonymous FTP directory?

  • PUBLIC_NOTICE.txt

What do we think a possible username
could be?

  • Mike

Exploiting FTP

https://tryhackme.com/room/networkservices

What is the password for the user “mike”?

  • password

Bingo! Now, let’s connect to the FTP server as this user using “ftp [IP]” and entering the credentials when prompted

What is ftp.txt?

  • THM{y0u_g0t_th3_ftp_fl4g}

Another insightful and fun lab this was. If you gained anything from this blog or found it interesting please let me know by giving me a clap or a follow. Stay tuned for more cybersecurity related contents.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Katjah Smith👩🏽‍💻
Katjah Smith👩🏽‍💻

Written by Katjah Smith👩🏽‍💻

I'm here to write about my experiences and all that I am learning while exploring the fascinating world of tech and cybersecurity. Follow my blog.

No responses yet

Write a response