Network services

Learn about, then enumerate and exploit a variety of network services and misconfigurations.

This room from tryHackMe introduces some good concept on network service security. Here, I have included some necessary concept from THM and other sources as a note. I also included task answers. Hope this will help readers.

No flag is disclosed here.

Task 2: Understanding SMB

How SMB works -

Unix system uses 'Samba' - which supports SMB. This is also available in Windows.

Task 3: Enumerating SMB

A very good tool for enumeration is : enum4linux

In this post, you will find an awesome checklist for SMB enumeration, created by 0xdf: Link here

Task 4: Exploiting SMB

Methodology for exploiting is

  • Get any misconfiguration

  • Get SMB share info

To remotely access the SMB share, we can use smbclient tool : smbclient //[IP]/[SHARE]

Task 5: Understanding Telnet

Telnet -

  • A protocol to connect and execute command to a remote server

  • Communicates in a plain text, no encryption

  • Command - telnet [IP] [port]

Task 6: Enumerating Telnet

Sometime only nmap scan is enough to enumerate.

Task 7: Exploiting Telnet

Two very good sites to search Exploit:

Screen shot 1
Screen shot 2

Task 8: Understanding FTP

File Transfer Protocol (FTP) -

  • This allows to transfer file over network

  • FTP operates using two channels

    • Command channel for transmitting command

    • Data channel to transfer data

  • This has two types of connections

    • Active FTP connection - client opens a port and listen, server connects to it

    • Passive FTP connection - server opens a port and listen passively, clients connect to it

Task 9: Enumerating FTP

Nmap scan can reveal good info about FTP running on a server.

Task 10: Exploiting FTP

2 ways to exploit -

  • MITM: as the FTP communication is unencrypted, attacker can read the plain text info

  • Brute force: the password can be weak often. So brute forcing it can give us access

Hydra command to brute force password:

hydra -t 4 -l [user] -P [wordlist location] -vV [IP] ftp

Last updated

Was this helpful?