*The Key is a Strong Foundation* # Faun - Challenge Setup ## Faun I connected to their OpenVPN service as I have my own AttackBox locally on my machine. ![](openvpn%20connection.png) I then spawned the machine: ![](spawn%20machine.png) We get the IP, and then the questions unlock. Let's answer the basic ones first, then check the machine. ### Task 1 ![](ftp%20meaning.png) ### Task 2 ![](ftp%20port%20number.png) ### Task 3 ![](sftp.png) ### Task 4 This is a similar answer to a challenge in [Tier 0 - Meow](Tier%200%20-%20Meow.md). ![](Resources/Learning/HackTheBox/Red%20Teaming/Basics/Faun/ping.png) ### Task 5 If we use the `-sV` flag for Nmap, we can find the ports that are open, as well as the service version! ![](ftp%20version.png) ![](nmap%20scan%20for%20ftp%20version.png) ### Task 6 We got this answer in the last scan! ![](unix%20os.png) ### Task 7 ![](ftp%20help%20menu.png) ### Task 8 Again, relatively easy if you know your stuff. ![](anonymous.png) ### Task 9 I know this from my years of schooling, haha! ![](ftp%20successful%20port.png) ### Task 10 ![](ls.png) ### Task 11 ![](ftp%20file%20get.png) ### Task 12 - Challenge Flag ![](submitted%20root%20flag.png) First, we connect to the FTP server with `anon`, no pass required. Then we list the files within the FTP server, and download the file using `get`. We can disconnect and `cat` the file to our screen. ![](ftp%20connection%20for%20challenge.png) > [!check]- Challenge Done!~ > ![](root%20flag%20in%20console.png)