Bruce Kamugisha Assignment 2 (Personal) Week2
Bruce Kamugisha Assignment 2 (Personal) Week2
Objective
The objective of this lab was to perform a penetration test on a vulnerable
machine (Metasploitable) from an attacker machine (Kali Linux), using the
Metasploit framework. The tasks included identifying IP addresses, scanning for
open ports, discovering vulnerabilities using Nmap, and exploiting the
vulnerable machine using CVE20112523.
Steps Taken
Networking Setup:
Ensured both Kali Linux (attacker) and Metasploitable (victim) machines
were connected to the same NAT network, allowing them to communicate
directly.
IP Address Identification:
Attacker Machine (Kali Linux) IP: 192.168.100.21
Victim Machine (Metasploitable) IP: 192.168.100.22
PicoCTF Challenges
Objective
The goal of these challenges was to perform information gathering by solving
various Capture the Flag (CTF) puzzles. I completed 10 challenges, each
involving different methods of gathering or analyzing data to find hidden
"flags."
Challenges Overview
1. Information (Easy)
Objective: Basic information gathering, likely involving inspecting basic file
properties.
Approach: Used basic commands to find hidden information or clues within
given files
Solution: Found the hidden flag after analyzing the file.
2. Insp3ct0r (Easy)
Objective: Inspect the HTML of a web page to find clues or flags.
Approach: Used browser developer tools to explore the HTML structure.
Solution: Found the flag hidden within the HTML comments.
7. Chrono (Medium)
Objective: Likely involved timebased or encoded data that needed to be
analyzed.
Approach: Used timerelated clues and possibly scripting tools to decode or
extract the flag.
Solution: Successfully decoded the flag by understanding and manipulating
the time data.
8. Secrets (Medium)
Objective: Identify hidden secrets, possibly in metadata or hidden fields.
Approach: Used tools like strings or metadata inspection tools to uncover
hidden data.
Solution: Found the flag embedded within the hidden data.
9. Vigenere (Medium)
Objective: Solve a cipher, specifically the Vigenère cipher.
Approach: Applied the Vigenère cipher decryption technique to the given
encoded message.
Solution: Decoded the message and retrieved the flag.
Challenges Faced
Understanding some of the encryption methods like the Vigenère cipher took
additional time, as it required manual key identification.
Some challenges required careful inspection of metadata, which was easy to
overlook at first.