Post

Sws101_pokemon

alt text

Scaning the Ip Address

Two ports are open that are port 22(ssh) and port 80 (http)

alt text

Bruteforcing the hidden directories

I found a html file that was just default welcome page used to test the correct operation of the Apache2 server after installation on Ubuntu systems

alt text

Exploring website

alt text

I view the source page and found the a password. Could this be the password of shh login.Let’s try username as pokemon and pass as hack_the_pokemon

alt text

It was a success.So now let’s find the pokemon alt text

Ohh!! there is a zip file let’s unzip and see what is inside

alt text

pokemon flags

grass type

I have got the grass type pokemon txt file. It was in a hexa decimal value so we can use the Cyber Chef to decode this text

see! we decode the code and the grass type pokemon was Bulbasaur

text

fire type

Now let’s locate the other pokemon by their type.

1
locate type.txt

we got the fire type pokmeon txt file

alt text

Again let’s decode it using the Cyber chef

alt text

Water type

Do the same for the water type except change the recipe to ROT13

alt text

Root’s Favorite Pokemon

Previously we found a file called gotta under the hidden directories of videos. I let’s search the root’s favourite pokemon inside that.Ohh! i got somethingn it says “Could_this_be_what_Im_looking_for?.cplusplus “ let’s cat that and I got username ash as password pikapika

alt text

I got into the root useing the username and password and got the root’s favourite pokemon. its pikachu. alt text

THANK YOU

This post is licensed under CC BY 4.0 by the author.

Trending Tags