Ciphers Security

TryHackMe Walkthrough: Protocols and Server 2

protocols and server 2

The Protocols and Servers room covered many protocols:

Room Link: Protocols and Server 2

  • Telnet
  • HTTP
  • FTP
  • SMTP
  • POP3
  • IMAP

Servers implementing these protocols are subject to different kinds of attacks. To name a few, consider:

  1. Sniffing Attack (Network Packet Capture)
  2. Man-in-the-Middle (MITM) Attack
  3. Password Attack (Authentication Attack)
  4. Vulnerabilities

From a security perspective, we always need to think about what we aim to protect; consider the security triad: Confidentiality, Integrity, and Availability (CIA). Confidentiality refers to keeping the contents of the communications accessible to the intended parties. 

Integrity is the idea of assuring any data sent is accurate, consistent, and complete when reaching its destination. Finally, availability refers to being able to access the service when we need it.

Different parties will put varying emphasis on these three. For instance, confidentiality would be the highest priority for an intelligence agency. Online banking will put most emphasis on the integrity of transactions. Availability is of the highest importance for any platform making money by serving ads.

Task 2 Sniffing Attack Protocols and Server

Question: What do you need to add to the command sudo tcpdump to capture only Telnet traffic?
Answer: port 23

Question: What do you need to add to the command sudo tcpdump to capture only Telnet traffic?
Answer: IMAP

Task 3 Man-in-the-Middle (MITM) Attack Protocols and Server

Question: How many different interfaces does Ettercap offer?
Answer: 3

Question: In how many ways can you invoke Bettercap?
Answer: 3

Task 4 Transport Layer Security (TLS) Protocols and Server

Question: DNS can also be secured using TLS. What is the three-letter acronym of the DNS protocol that uses TLS?
Answer: DoT

Task 5 Secure Shell (SSH) Protocols and Server

Question: Use SSH to connect to as mark with the password XBtc49AB. Using uname -r, find the Kernel release?
Answer: 5.4.0-84-generic

Question: Use SSH to download the file book.txt from the remote system. How many KBs did scp display as download size?
Answer: 415

Task 6 Password Attack Protocols and Server

Question: We learned that one of the email accounts is lazie. What is the password used to access the IMAP service on

  1. we need to do a brute force attack to find the password for account lazie
  2. here we are going to use hydra tool for brute forcing password over a server
  3. open terminal and type the following command
  4. hydra -l lazie -P /usr/share/wordlists/rockyou.txt imap
  5. you’ll get the password after the process is completed
hydra tool

Answer: butterfly

Task 7 Summary

default ports and protocols
Hydra tool usage

If you have any queries regarding the above content, or you want to update anything in the content, then contact us with your queries. You can directly post your question in the group.

Connect with us on these platforms


Connect with us