Which version of the FTP server is running on the target system? Submit the entire banner as the answer.
[Oct 16, 2025 - 11:00:49 (KST)] exegol-academy_htb
FTP # nmap -sC -sV 10.129.30.202 -T4
Starting Nmap 7.93 ( https://nmap.org ) at 2025-10-16 11:00 KST
Nmap scan report for 10.129.30.202
Host is up (0.20s latency).
Not shown: 994 closed tcp ports (reset)
PORT STATE SERVICE VERSION
21/tcp open ftp
| fingerprint-strings:
| GenericLines:
| 220 InFreight FTP v1.1
InFreight FTP v1.1
Enumerate the FTP server and find the flag.txt file. Submit the contents of it as the answer.
[Oct 16, 2025 - 11:11:43 (KST)] exegol-academy_htb
FTP # ftp 10.129.30.202
Connected to 10.129.30.202.
220 InFreight FTP v1.1
Name (10.129.30.202:root): anonymous
331 Anonymous login ok, send your complete email address as your password
Password:
230 Anonymous access granted, restrictions apply
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> ls
229 Entering Extended Passive Mode (|||46972|)
150 Opening ASCII mode data connection for file list
-rw-r--r-- 1 ftpuser ftpuser 39 Nov 8 2021 flag.txt
226 Transfer complete
ftp> get flag.txt
local: flag.txt remote: flag.txt
229 Entering Extended Passive Mode (|||38403|)
150 Opening BINARY mode data connection for flag.txt (39 bytes)
39 98.92 KiB/s
226 Transfer complete
39 bytes received in 00:00 (0.17 KiB/s)SMB
What version of the SMB server is running on the target system? Submit the entire banner as the answer.
SMB # nmap -sC -sV 10.129.30.202 -T4
Starting Nmap 7.93 ( https://nmap.org ) at 2025-10-16 11:16 KST
Nmap scan report for 10.129.30.202
Host is up (0.21s latency).
Not shown: 994 closed tcp ports (reset)
PORT STATE SERVICE VERSION
21/tcp open ftp ProFTPD
22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.2 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 3072 3f4c8f10f1aebecd31247ca14eab846d (RSA)
| 256 7b30376750b9ad91c08ff702783b7c02 (ECDSA)
|_ 256 889e0e07fecad05c60abcf1099cd6ca7 (ED25519)
111/tcp open rpcbind 2-4 (RPC #100000)
| rpcinfo:
| program version port/proto service
| 100000 2,3,4 111/tcp rpcbind
| 100000 2,3,4 111/udp rpcbind
| 100000 3,4 111/tcp6 rpcbind
| 100000 3,4 111/udp6 rpcbind
| 100003 3 2049/udp nfs
| 100003 3 2049/udp6 nfs
| 100003 3,4 2049/tcp nfs
| 100003 3,4 2049/tcp6 nfs
| 100005 1,2,3 34929/tcp6 mountd
| 100005 1,2,3 52027/udp6 mountd
| 100005 1,2,3 53691/tcp mountd
| 100005 1,2,3 55054/udp mountd
| 100021 1,3,4 40829/tcp6 nlockmgr
| 100021 1,3,4 45543/tcp nlockmgr
| 100021 1,3,4 50601/udp6 nlockmgr
| 100021 1,3,4 53710/udp nlockmgr
| 100227 3 2049/tcp nfs_acl
| 100227 3 2049/tcp6 nfs_acl
| 100227 3 2049/udp nfs_acl
|_ 100227 3 2049/udp6 nfs_acl
139/tcp open netbios-ssn Samba smbd 4.6.2
445/tcp open netbios-ssn Samba smbd 4.6.2Samba smbd 4.6.2
What is the name of the accessible share on the target?
[Oct 16, 2025 - 11:18:53 (KST)] exegol-academy_htb
SMB # smbclient -N -L //10.129.30.202
Sharename Type Comment
--------- ---- -------
print$ Disk Printer Drivers
sambashare Disk InFreight SMB v3.1
IPC$ IPC IPC Service (InlaneFreight SMB server (Samba, Ubuntu))
SMB1 disabled -- no workgroup availablesambashare
Connect to the discovered share and find the flag.txt file. Submit the contents as the answer.
[Oct 16, 2025 - 11:20:55 (KST)] exegol-academy_htb
SMB # smbclient //10.129.30.202/sambashare
Password for [WORKGROUP\root]:
Try "help" to get a list of possible commands.
smb: \> ls
. D 0 Mon Nov 8 22:43:14 2021
.. D 0 Tue Nov 9 00:53:19 2021
.profile H 807 Tue Feb 25 21:03:22 2020
contents D 0 Mon Nov 8 22:43:45 2021
.bash_logout H 220 Tue Feb 25 21:03:22 2020
.bashrc H 3771 Tue Feb 25 21:03:22 2020
5090944 blocks of size 1024. 1765936 blocks available
smb: \> get contents\flag.txt
getting file \contents\flag.txt of size 38 as contents\flag.txt (0.0 KiloBytes/sec) (average 0.0 KiloBytes/sec)Find out which domain the server belongs to.
[Oct 16, 2025 - 15:05:10 (KST)] exegol-academy_htb
SMB # enum4linux-ng 10.129.202.5 -A
ENUM4LINUX - next generation (v1.3.4)
---
===================================================
| Domain Information via RPC for 10.129.202.5 |
===================================================
[+] Domain: DEVOPS
[+] Domain SID: NULL SID
[+] Membership: workgroup memberDEVOPS
Find additional information about the specific share we found previously and submit the customized version of that specific share as the answer.
[Oct 16, 2025 - 15:05:10 (KST)] exegol-academy_htb
SMB # enum4linux-ng 10.129.202.5 -A
ENUM4LINUX - next generation (v1.3.4)
---
======================================
| Shares via RPC on 10.129.202.5 |
======================================
[*] Enumerating shares
[+] Found 3 share(s):
IPC$:
comment: IPC Service (InlaneFreight SMB server (Samba, Ubuntu))
type: IPC
print$:
comment: Printer Drivers
type: Disk
sambashare:
comment: InFreight SMB v3.1
type: DiskInFreight SMB v3.1
What is the full system path of that specific share? (format: “/directory/names”)
[Oct 16, 2025 - 15:13:29 (KST)] exegol-academy_htb
SMB # rpcclient -U '' -N "10.129.202.5"
rpcclient $> netshareenu
netshareenum netshareenumall
rpcclient $> netshareenu
netshareenum netshareenumall
rpcclient $> netshareenumall
netname: print$
remark: Printer Drivers
path: C:\var\lib\samba\printers
password:
netname: sambashare
remark: InFreight SMB v3.1
path: C:\home\sambauser\/home/sambauser
NFS
Enumerate the NFS service and submit the contents of the flag.txt in the “nfs” share as the answer.
[Oct 26, 2025 - 22:17:25 (KST)] exegol-academy_htb
NFS # showmount -e '10.129.202.5'
Export list for 10.129.202.5:
/var/nfs 10.0.0.0/8
/mnt/nfsshare 10.0.0.0/8]
[Oct 26, 2025 - 22:19:23 (KST)] exegol-academy_htb
NFS # mkdir nfs_mount
[Oct 26, 2025 - 22:19:36 (KST)] exegol-academy_htb
NFS # mount -t nfs 10.129.202.5:/ ./nfs_mount
[Oct 26, 2025 - 22:20:03 (KST)] exegol-academy_htb
NFS # cat nfs_mount/var/nfs/flag.txt
HTB{hjglmvtkjhlkfuhgi734zthrie7rjmdze}HTB{hjglmvtkjhlkfuhgi734zthrie7rjmdze}
Enumerate the NFS service and submit the contents of the flag.txt in the “nfsshare” share as the answer.
[Oct 26, 2025 - 22:22:14 (KST)] exegol-academy_htb
NFS # cat nfs_mount/mnt/nfsshare/flag.txt
HTB{8o7435zhtuih7fztdrzuhdhkfjcn7ghi4357ndcthzuc7rtfghu34}HTB{8o7435zhtuih7fztdrzuhdhkfjcn7ghi4357ndcthzuc7rtfghu34}
DNS
Interact with the target DNS using its IP address and enumerate the FQDN of it for the “inlanefreight.htb” domain.
[Oct 26, 2025 - 23:04:29 (KST)] exegol-academy_htb
DNS # dig ANY inlanefreight.htb @10.129.80.249
; <<>> DiG 9.18.33-1~deb12u2-Debian <<>> ANY inlanefreight.htb @10.129.80.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 51892
;; flags: qr aa rd; QUERY: 1, ANSWER: 5, AUTHORITY: 0, ADDITIONAL: 2
;; WARNING: recursion requested but not available
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
; COOKIE: 675137e478e1860d0100000068fe2a7050bde8af516d0f42 (good)
;; QUESTION SECTION:
;inlanefreight.htb. IN ANY
;; ANSWER SECTION:
inlanefreight.htb. 604800 IN TXT "atlassian-domain-verification=t1rKCy68JFszSdCKVpw64A1QksWdXuYFUeSXKU"
inlanefreight.htb. 604800 IN TXT "v=spf1 include:mailgun.org include:_spf.google.com include:spf.protection.outlook.com include:_spf.atlassian.net ip4:10.129.124.8 ip4:10.129.127.2 ip4:10.129.42.106 ~all"
inlanefreight.htb. 604800 IN TXT "MS=ms97310371"
inlanefreight.htb. 604800 IN SOA inlanefreight.htb. root.inlanefreight.htb. 2 604800 86400 2419200 604800
inlanefreight.htb. 604800 IN NS ns.inlanefreight.htb.
;; ADDITIONAL SECTION:
ns.inlanefreight.htb. 604800 IN A 127.0.0.1
;; Query time: 197 msec
;; SERVER: 10.129.80.249#53(10.129.80.249) (TCP)
;; WHEN: Sun Oct 26 23:04:30 KST 2025
;; MSG SIZE rcvd: 437ns.inlanefreight.htb
Identify if its possible to perform a zone transfer and submit the TXT record as the answer. (Format: HTB{…})
[Oct 26, 2025 - 23:17:59 (KST)] exegol-academy_htb
DNS # dig axfr internal.inlanefreight.htb @ns.inlanefreight.htb
; <<>> DiG 9.18.33-1~deb12u2-Debian <<>> axfr internal.inlanefreight.htb @ns.inlanefreight.htb
;; global options: +cmd
internal.inlanefreight.htb. 604800 IN SOA inlanefreight.htb. root.inlanefreight.htb. 2 604800 86400 2419200 604800
internal.inlanefreight.htb. 604800 IN TXT "MS=ms97310371"
internal.inlanefreight.htb. 604800 IN TXT "HTB{DN5_z0N3_7r4N5F3r_iskdufhcnlu34}"
internal.inlanefreight.htb. 604800 IN TXT "atlassian-domain-verification=t1rKCy68JFszSdCKVpw64A1QksWdXuYFUeSXKU"
internal.inlanefreight.htb. 604800 IN TXT "v=spf1 include:mailgun.org include:_spf.google.com include:spf.protection.outlook.com include:_spf.atlassian.net ip4:10.129.124.8 ip4:10.129.127.2 ip4:10.129.42.106 ~all"
internal.inlanefreight.htb. 604800 IN NS ns.inlanefreight.htb.
dc1.internal.inlanefreight.htb. 604800 IN A 10.129.34.16
dc2.internal.inlanefreight.htb. 604800 IN A 10.129.34.11
mail1.internal.inlanefreight.htb. 604800 IN A 10.129.18.200
ns.internal.inlanefreight.htb. 604800 IN A 127.0.0.1
vpn.internal.inlanefreight.htb. 604800 IN A 10.129.1.6
ws1.internal.inlanefreight.htb. 604800 IN A 10.129.1.34
ws2.internal.inlanefreight.htb. 604800 IN A 10.129.1.35
wsus.internal.inlanefreight.htb. 604800 IN A 10.129.18.2
internal.inlanefreight.htb. 604800 IN SOA inlanefreight.htb. root.inlanefreight.htb. 2 604800 86400 2419200 604800
;; Query time: 197 msec
;; SERVER: 10.129.80.249#53(ns.inlanefreight.htb) (TCP)
;; WHEN: Sun Oct 26 23:18:07 KST 2025
;; XFR size: 15 records (messages 1, bytes 677)HTB{DN5_z0N3_7r4N5F3r_iskdufhcnlu34}
What is the IPv4 address of the hostname DC1?
10.129.34.16
What is the FQDN of the host where the last octet ends with “x.x.x.203”?
[Oct 26, 2025 - 23:42:54 (KST)] exegol-academy_htb
DNS # gobuster dns -d 'dev.inlanefreight.htb' -w `fzf-wordlists` -r inlanefreight.htb -i -t 100
===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Domain: dev.inlanefreight.htb
[+] Threads: 100
[+] Resolver: inlanefreight.htb
[+] Show IPs: true
[+] Timeout: 1s
[+] Wordlist: /opt/lists/seclists/Discovery/DNS/fierce-hostlist.txt
===============================================================
Starting gobuster in DNS enumeration mode
===============================================================
Found: dev1.dev.inlanefreight.htb [10.12.3.6]
Found: ns.dev.inlanefreight.htb [127.0.0.1]
Found: win2k.dev.inlanefreight.htb [10.12.3.203]
Progress: 2280 / 2281 (99.96%)
===============================================================
Finished
===============================================================win2k.dev.inlanefreight.htb
SMTP
기본개념
- 정의 : IP 네트워크에서 이메일을 전송하기 위한 프로토콜
- 역할: 클라이언트와 서버 간, 또는 서버와 서버 간의 이메일 전송에 사용
- 포트:
- Port 25: 기본적인 SMTP 통신 포트
- Port 587: 인증된 사용자가
STARTTLS명령을 통해 암호화된 연결을 시작할 때 사용 - Port 465: SSL/TLS 암호화 연결에 사용
전송 흐름
- MUA (Mail User Agent): 사용자 클라이언트 (예: 아웃룩, Gmail)
- MSA (Mail Submission Agent): 메일 제출을 받아 유효성을 검사
- MTA (Mail Transfer Agent): 스팸 확인 및 DNS 조회를 통해 다른 서버로 메일을 전송
- MDA (Mail Delivery Agent): 최종 목적지 서버에서 메일을 수신자의 메일박스로 전달
주요 취약점
- 평문 전송 : 기본적으로 SMTP는 암호화되지 않아 모든 명령, 데이터, 인증 정보를 평문으로 전송
- 발신자 인증 부족 : 프로토콜 자체에 발신자 인증이 없어 ‘메일 스푸핑’(발신자 위조)에 취약
- 오픈 릴레이 : 가장 심각한 설정 취약점.
mynetworks = 0.0.0.0/0처럼 잘못 설정되면, 누구나 이 서버를 스팸이나 피싱 메일 발송에 악용 가능
Questions
Enumerate the SMTP service and submit the banner, including its version as the answer.
SMTP # telnet 10.129.72.120 25
Trying 10.129.72.120...
Connected to 10.129.72.120.
Escape character is '^]'.
220 InFreight ESMTP v2.11InFreight ESMTP v2.11
Enumerate the SMTP service even further and find the username that exists on the system. Submit it as the answer.

사용한 wordlists는 Resources 안에서 받았습니다.
msf6 > search smtp_enum
Matching Modules
================
# Name Disclosure Date Rank Check Description
- ---- --------------- ---- ----- -----------
0 auxiliary/scanner/smtp/smtp_enum . normal No SMTP User Enumeration Utility
Interact with a module by name or index. For example info 0, use 0 or use auxiliary/scanner/smtp/smtp_enum
msf6 > use 0
msf6 auxiliary(scanner/smtp/smtp_enum) > options
Module options (auxiliary/scanner/smtp/smtp_enum):
Name Current Setting Required Description
---- --------------- -------- -----------
RHOSTS yes The target host(s), see https://docs.metasploit.com/docs/using-metaspl
oit/basics/using-metasploit.html
RPORT 25 yes The target port (TCP)
THREADS 1 yes The number of concurrent threads (max one per host)
UNIXONLY true yes Skip Microsoft bannered servers when testing unix users
USER_FILE /opt/tools/metasploit-framework/data/wo yes The file that contains a list of probable users accounts.
rdlists/unix_users.txt
View the full module info with the info, or info -d command.
msf6 auxiliary(scanner/smtp/smtp_enum) > set rhosts 10.129.72.120
rhosts => 10.129.72.120
msf6 auxiliary(scanner/smtp/smtp_enum) > set user_file /workspace/Footprinting/SMTP/footprinting-wordlist.txt
user_file => /workspace/Footprinting/SMTP/footprinting-wordlist.txt
msf6 auxiliary(scanner/smtp/smtp_enum) > exploit
[*] 10.129.72.120:25 - 10.129.72.120:25 Banner: 220 InFreight ESMTP v2.11
[+] 10.129.72.120:25 - 10.129.72.120:25 Users found: robin
[*] 10.129.72.120:25 - Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completedrobin
IMAP / POP3
기본 개념
IMAP (Internet Message Access Protocol)
- 서버에서 이메일을 온라인으로 직접 관리
- 폴더 구조 지원 및 여러 클라이언트 간 동기화 가능
- 이메일이 삭제될 때까지 서버에 보관됨
- 포트 143 (평문), 993 (SSL/TLS)
POP3 (Post Office Protocol 3)
- 제한된 기능: 목록 조회, 검색, 삭제만 가능
- IMAP보다 단순한 구조
- 포트 110 (평문), 995 (SSL/TLS)
주요 명령어
IMAP 명령어
LOGIN- 사용자 로그인LIST- 디렉토리 목록SELECT- 메일함 선택FETCH- 메시지 데이터 검색LOGOUT- 연결 종료
POP3 명령어
USER/PASS- 인증STAT- 저장된 이메일 수 요청RETR- 이메일 다운로드DELE- 이메일 삭제QUIT- 연결 종료
보안 취약점
위험한 설정
auth_debug- 인증 디버그 로깅 활성화auth_debug_passwords- 비밀번호 로깅auth_verbose_passwords- 인증 비밀번호 상세 로깅auth_anonymous_username- 익명 로그인 허용
보안 이슈
- 기본적으로 평문 전송 (암호화 없음)
- 명령어, 이메일, 인증 정보가 노출 가능
- SSL/TLS를 통한 암호화 권장
정찰(Footprinting) 방법
Nmap 스캔
- 포트 110, 143, 993, 995 스캔
- SSL 인증서 정보 확인 (조직명, 도메인 등)
- 서비스 버전 및 지원 기능 확인
cURL 활용
curl -k 'imaps://[IP]' --user [username]:[password]- TLS 버전, 인증서 상세 정보, 배너 확인 가능
- 메일함 목록 조회
Questions
Figure out the exact organization name from the IMAP/POP3 service and submit it as the answer.
InlaneFreight Ltd
What is the FQDN that the IMAP and POP3 servers are assigned to?
dev.inlanefreight.htb
Enumerate the IMAP service and submit the flag as the answer. (Format: HTB{…})
Footprinting # openssl s_client -connect 10.129.141.10:imaps
CONNECTED(00000003)
Cant use SSL_get_servername
depth=0 C = UK, ST = London, L = London, O = InlaneFreight Ltd, OU = DevOps Dep\C3\83artment, CN = dev.inlanefreight.htb, emailAddress = [email protected]
verify error:num=18:self-signed certificate
verify return:1
depth=0 C = UK, ST = London, L = London, O = InlaneFreight Ltd, OU = DevOps Dep\C3\83artment, CN = dev.inlanefreight.htb, emailAddress = [email protected]
verify return:1
---
Certificate chain
0 s:C = UK, ST = London, L = London, O = InlaneFreight Ltd, OU = DevOps Dep\C3\83artment, CN = dev.inlanefreight.htb, emailAddress = [email protected]
i:C = UK, ST = London, L = London, O = InlaneFreight Ltd, OU = DevOps Dep\C3\83artment, CN = dev.inlanefreight.htb, emailAddress = [email protected]
a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
v:NotBefore: Nov 8 23:10:05 2021 GMT; NotAfter: Aug 23 23:10:05 2295 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----
MIIEUzCCAzugAwIBAgIUDf35PqFuv6Uv0EECM8dFmNSZoY8wDQYJKoZIhvcNAQEL
BQAwgbcxCzAJBgNVBAYTAlVLMQ8wDQYDVQQIDAZMb25kb24xDzANBgNVBAcMBkxv
bmRvbjEaMBgGA1UECgwRSW5sYW5lRnJlaWdodCBMdGQxHDAaBgNVBAsME0Rldk9w
cyBEZXDDg2FydG1lbnQxHjAcBgNVBAMMFWRldi5pbmxhbmVmcmVpZ2h0Lmh0YjEs
MCoGCSqGSIb3DQEJARYdY3RvLmRldkBkZXYuaW5sYW5lZnJlaWdodC5odGIwIBcN
MjExMTA4MjMxMDA1WhgPMjI5NTA4MjMyMzEwMDVaMIG3MQswCQYDVQQGEwJVSzEP
MA0GA1UECAwGTG9uZG9uMQ8wDQYDVQQHDAZMb25kb24xGjAYBgNVBAoMEUlubGFu
ZUZyZWlnaHQgTHRkMRwwGgYDVQQLDBNEZXZPcHMgRGVww4NhcnRtZW50MR4wHAYD
VQQDDBVkZXYuaW5sYW5lZnJlaWdodC5odGIxLDAqBgkqhkiG9w0BCQEWHWN0by5k
ZXZAZGV2LmlubGFuZWZyZWlnaHQuaHRiMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A
MIIBCgKCAQEAxvMwFE6m+iBUSujb5d6DUy1xDYR5awzQRwddyvq6iBrMxbnptSrn
+j0UOKWHCOpD5LREwP26ghUg0lVJzfo+v5pQJGnxEXKg0OFlzWEd8xgx/JWW/z1/
rDsWlNa2yYZkCy68YWJlC7UZxvcDFrI0V0pDJIkrjForw26laoYDkrh1A5F8uUXD
1TwRLLYo+NGmtNHT3BADJpv6aFUZ4CGrqBQNi7XpsTZ948WLhUwQvWmebiK06Dai
TvMNKBctjWAiNI4xvq34W9hIUaPxT1JJzuujRslep6nHGHW00QEWTWgyOMYThc3b
HtKIHMfDLTUMz7s8RhVVwlWE6+ly1DMRgQIDAQABo1MwUTAdBgNVHQ4EFgQUGDTC
9B5KCKPWT7vXbnMunL/mEE4wHwYDVR0jBBgwFoAUGDTC9B5KCKPWT7vXbnMunL/m
EE4wDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAQEADh0v5XWCf3KO
atrWcoiIOC67Z0ZIO7yEF+fQo8z+Wx1dWzmCFVu7u4+l7slcdJICCGBbOX8eItWS
chwzgnWJToyX8PWY8lSaB8ifMDQcr457Y7O6NmvgU35sRcLnYYqXzu2oh0lxsFLR
vL1wpyDLPhhoI++j1fELhiJ3GWiUQrb0vfJPcbSkHTgzf0hm7mLJTaqt3WfS/Gr2
8Oh7vSfzvqvHLE7HHAO0G5Q81zo+wWsrQF0s40HEF/raEMfOy2Htm79YjyjAlLWf
ueS+u8rX2smOYdRIpL3UPx7+yZPGu47vYoetde1Z5cfTCgmeS05BQ2qMOp6Tw6+G
xUuqg8nK1Q==
-----END CERTIFICATE-----
subject=C = UK, ST = London, L = London, O = InlaneFreight Ltd, OU = DevOps Dep\C3\83artment, CN = dev.inlanefreight.htb, emailAddress = [email protected]
issuer=C = UK, ST = London, L = London, O = InlaneFreight Ltd, OU = DevOps Dep\C3\83artment, CN = dev.inlanefreight.htb, emailAddress = [email protected]
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 1667 bytes and written 377 bytes
Verification error: self-signed certificate
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Server public key is 2048 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 18 (self-signed certificate)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
Protocol : TLSv1.3
Cipher : TLS_AES_256_GCM_SHA384
Session-ID: F33055E85E205FE312DB9A02721F86480284C46CFAAA9E3FA9F2DF1D747E6097
Session-ID-ctx:
Resumption PSK: 037CBAF5F1F4C617A592B65D8FD313C4A82CCD05E675F06DC43BFE440EE20DE904BAEF3AB7C09424E22CFA1E05627F94
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 7200 (seconds)
TLS session ticket:
0000 - b2 8d 52 df 0d 6c 13 69-c2 c3 c2 65 9f e0 5b c2 ..R..l.i...e..[.
0010 - 60 5f 4b 2f ec 25 b8 4b-d7 cf e3 00 5a 2a 33 6c `_K/.%.K....Z*3l
0020 - f5 fb e0 5e 73 39 2d 6e-56 d5 04 eb 64 dd ee 62 ...^s9-nV...d..b
0030 - d9 2a 4a fd 6a 91 96 11-f0 9d 88 ba fc e4 73 17 .*J.j.........s.
0040 - 1f 60 eb aa 11 67 b6 90-f1 f3 8b ab 7a 5a d6 e9 .`...g......zZ..
0050 - c7 ab 4b 14 0a 82 95 a9-8b 87 f5 b3 0f d8 29 65 ..K...........)e
0060 - bd 55 2f 64 0a 6e 34 5e-98 bc b6 d0 b4 2d 44 24 .U/d.n4^.....-D$
0070 - ea 07 10 54 30 89 3d 15-e8 9c 0e c1 f7 df 4f fb ...T0.=.......O.
0080 - 81 ce 00 56 2c ef 54 fd-dc 25 6e 59 0b 4b e7 7f ...V,.T..%nY.K..
0090 - b1 0d b2 12 f1 99 98 16-be 9c 9c ce 45 8b 89 84 ............E...
00a0 - f1 cb c5 cb e3 51 76 80-e7 58 17 a0 a7 21 1e 39 .....Qv..X...!.9
00b0 - 03 25 a3 e0 43 bf e4 68-0b 12 9c 3b 76 55 c1 e7 .%..C..h...;vU..
Start Time: 1763712544
Timeout : 7200 (sec)
Verify return code: 18 (self-signed certificate)
Extended master secret: no
Max Early Data: 0
---
read R BLOCK
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
Protocol : TLSv1.3
Cipher : TLS_AES_256_GCM_SHA384
Session-ID: 34AD1C2CA32E95D4AB67E2FCCB695F5455717FBC053948BA3033F69EAFC7F030
Session-ID-ctx:
Resumption PSK: D482EA66BE01410371ED05F0A03ABF705E6DDC5153824BBA37E6F4FD4CD0C2E51F222D89D3E79E0BDD89A78278EB0B40
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 7200 (seconds)
TLS session ticket:
0000 - b2 8d 52 df 0d 6c 13 69-c2 c3 c2 65 9f e0 5b c2 ..R..l.i...e..[.
0010 - 5b 50 54 3f ff 5b 55 e4-bb 07 83 fa 77 07 bf 26 [PT?.[U.....w..&
0020 - 7d d4 f8 4b 1a a0 00 c4-8b 38 f7 d8 7a 70 80 2c }..K.....8..zp.,
0030 - 22 b6 25 ef 2b 84 6d 3d-ee 21 5c 7d 9a 13 50 3f \".%.+.m=.!\}..P?
0040 - 69 56 88 2a 34 82 f9 7d-9c 56 08 05 ff 47 98 ad iV.*4..}.V...G..
0050 - fd e6 f6 01 76 d4 62 d9-b4 d3 fb ba 95 42 8a 1f ....v.b......B..
0060 - dd b1 d5 b2 bb a1 5b 63-3b fd df 32 6d 35 9d 16 ......[c;..2m5..
0070 - a6 9a e3 d4 b3 ee 03 a1-54 19 2e 20 d2 6f ad a1 ........T.. .o..
0080 - 3f bc c5 ab 3a ac a9 d1-0f a7 b5 2b 9d 1e e8 bc ?...:......+....
0090 - 18 52 90 0f 7c 3b 90 11-ed 73 87 c9 15 8c 84 30 .R..|;...s.....0
00a0 - a6 58 be 07 52 1e 9e fb-87 5d 69 1a 8e 07 eb 25 .X..R....]i....%
00b0 - 9d d1 5d b6 30 c3 c7 69-62 6c 1e 62 62 49 ed 6b ..].0..ibl.bbI.k
Start Time: 1763712544
Timeout : 7200 (sec)
Verify return code: 18 (self-signed certificate)
Extended master secret: no
Max Early Data: 0
---
read R BLOCK
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ AUTH=PLAIN] HTB{roncfbw7iszerd7shni7jr2343zhrj}HTB{roncfbw7iszerd7shni7jr2343zhrj}
What is the customized version of the POP3 server?

InFreight POP3 v9.188
What is the admin email address?
msf6 auxiliary(scanner/smtp/smtp_enum) > set rhosts 10.129.72.120
rhosts => 10.129.72.120
msf6 auxiliary(scanner/smtp/smtp_enum) > set user_file /workspace/Footprinting/SMTP/footprinting-wordlist.txt
user_file => /workspace/Footprinting/SMTP/footprinting-wordlist.txt
msf6 auxiliary(scanner/smtp/smtp_enum) > exploit
[*] 10.129.72.120:25 - 10.129.72.120:25 Banner: 220 InFreight ESMTP v2.11
[+] 10.129.72.120:25 - 10.129.72.120:25 Users found: robin
[*] 10.129.72.120:25 - Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed계정 정보 robin / robin
a1 LOGIN robin robin
a1 OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE SORT SORT=DISPLAY THREAD=REFERENCES THREAD=REFS THREAD=ORDEREDSUBJECT MULTIAPPEND URL-PARTIAL CATENATE UNSELECT CHILDREN NAMESPACE UIDPLUS LIST-EXTENDED I18NLEVEL=1 CONDSTORE QRESYNC ESEARCH ESORT SEARCHRES WITHIN CONTEXT=SEARCH LIST-STATUS BINARY MOVE SNIPPET=FUZZY PREVIEW=FUZZY LITERAL+ NOTIFY SPECIAL-USE] Logged in
a2 LIST "" *
* LIST (\Noselect \HasChildren) "." DEV
* LIST (\Noselect \HasChildren) "." DEV.DEPARTMENT
* LIST (\HasNoChildren) "." DEV.DEPARTMENT.INT
* LIST (\HasNoChildren) "." INBOX
a2 OK List completed (0.001 + 0.000 secs).
a3 SELECT "DEV.DEPARTMENT.INT"
* FLAGS (\Answered \Flagged \Deleted \Seen \Draft)
* OK [PERMANENTFLAGS (\Answered \Flagged \Deleted \Seen \Draft \*)] Flags permitted.
* 1 EXISTS
* 0 RECENT
* OK [UIDVALIDITY 1636414279] UIDs valid
* OK [UIDNEXT 2] Predicted next UID
a3 OK [READ-WRITE] Select completed (0.001 + 0.000 secs).
a4 FETCH 1:* (BODY[HEADER.FIELDS (SUBJECT FROM)])
* 1 FETCH (BODY[HEADER.FIELDS (SUBJECT FROM)] {57}
Subject: Flag
From: CTO <[email protected]b>
)
a4 OK Fetch completed (0.001 + 0.000 secs).
a5 FETCH 1 BODY[]
* 1 FETCH (BODY[] {167}
Subject: Flag
To: Robin <[email protected]b>
From: CTO <[email protected]b>
Date: Wed, 03 Nov 2021 16:13:27 +0200
HTB{983uzn8jmfgpd8jmof8c34n7zio}
)
a5 OK Fetch completed (0.001 + 0.000 secs).devadmin
Try to access the emails on the IMAP server and submit the flag as the answer. (Format: HTB{…})
HTB{983uzn8jmfgpd8jmof8c34n7zio}
SNMP
기본 개념
- 목적: 네트워크 장비(라우터, 스위치, 서버, IoT 등)의 모니터링 및 원격 제어/설정
- 동작 방식:
- Polling (요청/응답): 클라이언트가 정보를 요청하고 장비가 응답 (UDP 161번 포트)
- Trap (알림): 장비에서 특정 이벤트 발생 시, 요청 없이 클라이언트에게 데이터 전송 (UDP 162번 포트)
핵심 요소: MIB & OID
MIB (Management Information Base)
- 장비가 가진 정보들의 데이터베이스 구조
- 제조사마다 다르며, 텍스트 파일로 되어 있고, 실제 데이터가 있는게 아닌 데이터의 위치와 속성만 정의
OID (Object Identifier)
- MIB 트리 내에서 특정 정보를 가리키는 고유 주소
- 계층적 숫자 구조로 되어 있음 (ex:
1.3.6.1.2)
버전별 특징
| 버전 | 특징 | 보안 수준 | 비고 |
|---|---|---|---|
| v1 | 최초 버전. 암호화 없음. | 낮음 | 모든 데이터(커뮤니티 스트링 포함) 평문 전송. |
| v2c | 기능 확장, 대량 전송 지원. | 낮음 | Community String 기반 인증. 여전히 평문 전송. 가장 많이 쓰임. |
| v3 | 인증(ID/PW) 및 암호화 지원. | 높음 | 설정이 복잡하여 관리자들이 v2c를 계속 쓰는 경우가 많음. |
설정과 보안 위협
- 주로 잘못된 설정(Misconfiguration)을 노림
Community String
- ID/PW 역할을 하는 문자열
- v1, v2c에서는 평문으로 전송되기 때문에 도청(Sniffing) 시 탈취 가능
위험한 설정 예시
rwuser noauth: 인증 없이 전체 OID 트리에 읽기/쓰기 권한 부여rwcommunity: 특정 IP나 전체에 대해 읽기/쓰기 권한 부여
Footprinting 도구
snmpwalk
- 사용 목적: OID를 순차적으롤 조회하여 장비의 상세 정보 수집 Example
snmpwalk -v2c -c public <Target_IP>onesixtyone
- 사용 목적: Community String을 브루트포싱하여 조회 Example
onesixtyone -c /path/to/wordlist.txt <Target_IP>braa
- 사용 목적: Community String을 이미 알고, 특정 OID 대역을 대량으로 스캔하는 도구 Example
braa public@<Target_IP>:.1.3.6.*