root@rumais:~# inspect nerdherd

Nerd Herd

Linux room covering service enumeration, initial access, and privilege escalation. This page combines the local notes, supporting artifacts, and a cleaned-up summary of the room path.

Room Details

Primary writeup exists in local notes. This room is grouped under Linux and PrivEsc.

Linux and PrivEsc 1 markdown source 2 docx note 3 command artifact

Summary

Nerd Herd is generally approached through layered clue-chaining: combine web hints, FTP artifacts, and SMB enumeration to recover credentials, obtain a Linux foothold, and then escalate through local weaknesses uncovered during post-exploitation.

multi-service enumeration cipher or clue analysis SMB credential recovery Linux post-exploitation

Notes

Recon

  • This room expects the attacker to combine clues across web, FTP, and SMB instead of relying on a single service.
  • The early hints come from source comments, encoded values, and leaked artifact names that only make sense after some decoding or pattern matching.

Initial Access

  • FTP and SMB enumeration provide the user context and the secret material needed to recover the working credentials.
  • Once the share and clue chain are solved, SSH becomes the practical foothold into the Linux host.

Privilege Escalation

  • After login, local enumeration becomes the deciding factor.
  • The final escalation depends on host weakness rather than application logic, and the room rewards thorough post-exploitation review.

Security Notes

  • Small clue leaks across multiple services often combine into a full credential path even if each single leak looks harmless.
  • Shared secrets between SMB, FTP, and SSH reduce an attacker’s workload dramatically.
  • Attackers only need one successful interpretation of a clue chain to turn soft exposure into root access.

Supporting Files

Hellon3Rd

all you need is in the leet

Secr3T

Ssssh! don’t tell this anyone because you deserved it this far: check out “/this1sn0tadirect0ry” Sincerely, 0xpr0N3rd <3

Collected Output

gobuster-initial

===============================================================
Gobuster v3.1.0
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://10.10.29.89:1337/
[+] Method:                  GET
[+] Threads:                 64
[+] Wordlist:                /usr/share/wordlists/dirb/common.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.1.0
[+] Timeout:                 10s
===============================================================
2021/10/08 21:26:22 Starting gobuster in directory enumeration mode
===============================================================

/.htpasswd            (Status: 403) [Size: 278]

/.htaccess            (Status: 403) [Size: 278]

/admin                (Status: 301) [Size: 317] [--> http://10.10.29.89:1337/admin/]

/.hta                 (Status: 403) [Size: 278]                                     

/index.html           (Status: 200) [Size: 11755]                                   

/server-status        (Status: 403) [Size: 278]                                     
===============================================================
2021/10/08 21:27:12 Finished
===============================================================

nmap-full-port

# Nmap 7.91 scan initiated Fri Oct  8 21:12:04 2021 as: nmap -p- -sV -oN nmap-full-port -T4 -vvv 10.10.29.89
Increasing send delay for 10.10.29.89 from 0 to 5 due to 951 out of 2376 dropped probes since last increase.
Warning: 10.10.29.89 giving up on port because retransmission cap hit (6).
Nmap scan report for 10.10.29.89
Host is up, received echo-reply ttl 63 (0.25s latency).
Scanned at 2021-10-08 21:12:05 IST for 2769s
Not shown: 65497 closed ports
Reason: 65497 resets
PORT      STATE    SERVICE     REASON         VERSION
21/tcp    open     ftp         syn-ack ttl 63 vsftpd 3.0.3
22/tcp    open     ssh         syn-ack ttl 63 OpenSSH 7.2p2 Ubuntu 4ubuntu2.10 (Ubuntu Linux; protocol 2.0)
139/tcp   open     netbios-ssn syn-ack ttl 63 Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
445/tcp   open     netbios-ssn syn-ack ttl 63 Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
1337/tcp  open     http        syn-ack ttl 63 Apache httpd 2.4.18 ((Ubuntu))
1374/tcp  filtered molly       no-response
3796/tcp  filtered spw-dialer  no-response
5089/tcp  filtered unknown     no-response
5668/tcp  filtered unknown     no-response
7016/tcp  filtered spg         no-response
10404/tcp filtered unknown     no-response
10512/tcp filtered unknown     no-response
11606/tcp filtered unknown     no-response
12539/tcp filtered unknown     no-response
13017/tcp filtered unknown     no-response
17486/tcp filtered unknown     no-response
18588/tcp filtered unknown     no-response
24260/tcp filtered unknown     no-response
24929/tcp filtered unknown     no-response
26976/tcp filtered unknown     no-response
28439/tcp filtered unknown     no-response
28510/tcp filtered unknown     no-response
29375/tcp filtered unknown     no-response
37443/tcp filtered unknown     no-response
38010/tcp filtered unknown     no-response
43314/tcp filtered unknown     no-response
44860/tcp filtered unknown     no-response
46321/tcp filtered unknown     no-response
48103/tcp filtered unknown     no-response
48107/tcp fi

nmap-initial

# Nmap 7.91 scan initiated Fri Oct  8 20:00:54 2021 as: nmap -sC -sV -oN nmap-initial -T4 10.10.29.89
Nmap scan report for 10.10.29.89
Host is up (0.23s latency).
Not shown: 996 closed ports
PORT    STATE SERVICE     VERSION
21/tcp  open  ftp         vsftpd 3.0.3
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
|_drwxr-xr-x    3 ftp      ftp          4096 Sep 11  2020 pub
| ftp-syst: 
|   STAT: 
| FTP server status:
|      Connected to ::ffff:10.8.224.214
|      Logged in as ftp
|      TYPE: ASCII
|      No session bandwidth limit
|      Session timeout in seconds is 300
|      Control connection is plain text
|      Data connections will be plain text
|      At session startup, client count was 1
|      vsFTPd 3.0.3 - secure, fast, stable
|_End of status
22/tcp  open  ssh         OpenSSH 7.2p2 Ubuntu 4ubuntu2.10 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 0c:84:1b:36:b2:a2:e1:11:dd:6a:ef:42:7b:0d:bb:43 (RSA)
|   256 e2:5d:9e:e7:28:ea:d3:dd:d4:cc:20:86:a3:df:23:b8 (ECDSA)
|_  256 ec:be:23:7b:a9:4c:21:85:bc:a8:db:0e:7c:39:de:49 (ED25519)
139/tcp open  netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
445/tcp open  netbios-ssn Samba smbd 4.3.11-Ubuntu (workgroup: WORKGROUP)
Service Info: Host: NERDHERD; OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel

Host script results:
|_clock-skew: mean: -59m59s, deviation: 1h43m54s, median: 0s
|_nbstat: NetBIOS name: NERDHERD, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown)
| smb-os-discovery: 
|   OS: Windows 6.1 (Samba 4.3.11-Ubuntu)
|   Computer name: nerdherd
|   NetBIOS computer name: NERDHERD\x00
|   Domain name: \x00
|   FQDN: nerdherd
|_  System time: 2021-10-08T17:31:29+03:00
| smb-security-mode: 
|   account_used: guest
|   authentication_level: user
|   challenge_response: supported
|_  message_signing: disabled (dangerous, but default)
| smb2-security-mode: 
|   2.02: 
|_    Message signing enabled but not required
| smb2-time: 
|   date: 2021-10-08T14:31:29
|_  start_date: N/A

Servic