{"id":11695,"date":"2024-03-18T15:36:51","date_gmt":"2024-03-18T10:06:51","guid":{"rendered":"https:\/\/reconforce.in\/blog\/?p=11671"},"modified":"2024-03-18T15:36:51","modified_gmt":"2024-03-18T10:06:51","slug":"brooklyn-nine-nine-ctf-2024-walkthrough","status":"publish","type":"post","link":"https:\/\/reconcybersecurity.com\/blogs\/brooklyn-nine-nine-ctf-2024-walkthrough\/","title":{"rendered":"Brooklyn Nine Nine CTF 2024 &#8211; Walkthrough"},"content":{"rendered":"\n<h2 id=\"introduction-to-brooklyn-nine-nine-ctf\" class=\"wp-block-heading\"><strong>Introduction to Brooklyn Nine Nine CTF<\/strong><\/h2>\n\n\n\n<p>Welcome to the Brooklyn Nine Nine CTF Walkthrough! In this guide, we&#8217;ll explore step-by-step how to conquer challenges inspired by the popular TV show. Whether you&#8217;re a seasoned cybersecurity enthusiast or a beginner eager to learn, this walkthrough will break down each task into simple, easy-to-follow steps. Get ready to test your skills, unravel clues, and emerge victorious in the ultimate cyber adventure based on Brooklyn Nine Nine!<\/p>\n\n\n\n<h2 id=\"setup-environment\" class=\"wp-block-heading\"><strong>Setup Environment<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns:auto 27%\"><div class=\"wp-block-media-text__content\">\n<p><strong>TryHackMe | Brooklyn Nine Nine<\/strong><\/p>\n\n\n\n<p>TryHackMe is an online platform for learning and teaching cyber security, all through your browser.<\/p>\n\n\n\n<p class=\"has-small-font-size\">tryhackme.com<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><a href=\"https:\/\/tryhackme.com\/room\/brooklynninenine\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/reconforce.in\/blog\/wp-content\/uploads\/2024\/03\/0-Uzndi32eyDlJsvSs.jpg\" alt=\"Brooklyn Nine Nine\" class=\"wp-image-11673 size-full\"\/><\/a><\/figure><\/div>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Via VulnHub:<\/strong> Download <strong>Brooklyn Nine Nine<\/strong> machine onto your local device, install it on a virtualization platform such as VirtualBox, configure the network settings, and initiate the attack.<\/li>\n\n\n\n<li><strong>Through TryHackMe:<\/strong> Alternatively, access to this machine is possible via TryHackMe. Download the VPN configuration file to your device and utilize openvpn with the specified command:<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/reconforce.in\/blog\/wp-content\/uploads\/2024\/02\/Screenshot_20240202_120545-2.png\" alt=\"\" class=\"wp-image-11594\"\/><\/figure>\n\n\n\n<p>You should see this line at the end of the code\u2026<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/reconforce.in\/blog\/wp-content\/uploads\/2024\/02\/Screenshot_20240202_121026.png\" alt=\"\" class=\"wp-image-11595\"\/><\/figure>\n\n\n\n<p>Alternatively, leverage the Attackbox offered by THM. A VPN connection is necessary since both our machine and the target machine need to be on the same network for effective attacks.&nbsp;<\/p>\n\n\n\n<p>Once all prerequisites are in place, we\u2019re set to initiate the scan on the target machine.<\/p>\n\n\n\n<h2 id=\"brooklyn-nine-nine-ctf-challenges\" class=\"wp-block-heading\"><strong>Brooklyn Nine Nine CTF Challenges<\/strong><\/h2>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Scanning IP with Nmap<\/strong><\/p>\n\n\n\n<p>After setting up the machine, our initial step is to scan its IP address using nmap. You can do this by running the command provided below:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap -v -sC &lt;Machine IP><\/code><\/pre>\n\n\n\n<p>Once the scanning is done, you can see that there is an FTP port opened&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconforce.in\/blog\/wp-content\/uploads\/2024\/03\/2024-03-18_14-29.png\" alt=\"\" class=\"wp-image-11676\"\/><\/figure>\n\n\n\n<p>So we can try an Anonymous FTP login and see if we can find something there.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ftp &lt;Machine IP><\/code><\/pre>\n\n\n\n<p>To retrieve the text file named note_to_jake.txt, simply type &#8216;<code>get<\/code>&#8216; followed by the file name. Afterward, close the FTP service.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconforce.in\/blog\/wp-content\/uploads\/2024\/03\/2024-03-18_14-35-1024x274.png\" alt=\"\" class=\"wp-image-11677\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconforce.in\/blog\/wp-content\/uploads\/2024\/03\/2024-03-18_15-06-1024x115.png\" alt=\"\" class=\"wp-image-11678\"\/><\/figure>\n\n\n\n<p>After reviewing the file, it appears that &#8216;Jake&#8217; is a username. So we will use <strong>Hydra<\/strong> to perform a brute-force attack and attempt an SSH login.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconforce.in\/blog\/wp-content\/uploads\/2024\/03\/2024-03-18_15-12-1024x199.png\" alt=\"\" class=\"wp-image-11679\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconforce.in\/blog\/wp-content\/uploads\/2024\/03\/2024-03-18_15-15.png\" alt=\"\" class=\"wp-image-11680\"\/><\/figure>\n\n\n\n<p>We successfully logged in via SSH. Once you get in the home directory then go in  &#8216;<strong>holt<\/strong>&#8216; directory, you&#8217;ll find the user flag for our Brooklyn Nine Nine CTF.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconforce.in\/blog\/wp-content\/uploads\/2024\/03\/2024-03-18_15-24.png\" alt=\"\" class=\"wp-image-11681\"\/><\/figure>\n\n\n\n<p>Now for the second flag, type sudo -l for login root access&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconforce.in\/blog\/wp-content\/uploads\/2024\/03\/2024-03-18_15-30-1024x115.png\" alt=\"\" class=\"wp-image-11682\"\/><\/figure>\n\n\n\n<p>Type the below command to get the root flag&#8230;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo \/usr\/bin\/less \/root\/root.txt<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconforce.in\/blog\/wp-content\/uploads\/2024\/03\/2024-03-18_15-32.png\" alt=\"\" class=\"wp-image-11683\"\/><\/figure>\n\n\n\n<p>Great job finishing the Brooklyn Nine Nine CTF! Explore our other <a href=\"https:\/\/reconforce.in\/blog\/category\/ctf-walkthrough\/\" target=\"_blank\" rel=\"noreferrer noopener\">walkthroughs<\/a> for more exciting CTFs.<\/p>\n","protected":false},"excerpt":{"rendered":"Introduction to Brooklyn Nine Nine CTF Welcome to the Brooklyn Nine Nine CTF Walkthrough! In this guide, we&#8217;ll&hellip;\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2318],"tags":[2332,2333,2316,2334,2335,2331],"class_list":{"0":"post-11695","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-ctf-walkthrough","7":"tag-brooklyn-nine-nine","8":"tag-brooklyn99","9":"tag-ctf","10":"tag-ctf-tutorial","11":"tag-ctf-walkthrough","12":"tag-tryhackme"},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/11695","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/comments?post=11695"}],"version-history":[{"count":0,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/11695\/revisions"}],"wp:attachment":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media?parent=11695"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/categories?post=11695"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/tags?post=11695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}