4.7 Target 9
This target was compromised by analyzing network traffic. By using the knowledge of the relationship with target 6, we began monitoring tcp packets sent and delivered to target 9. After collecting the packets, we then analyzed the packets using Wireshark. We noticed that many of the packets were referenced as the telnet protocol. After analyzing the packet, we discovered that the username and password of a user bob were displayed in plain text. We then were able to use these credentials to access the target 9 server from telnet. We left behind the file ‘guest_list.txt’ as proof of access.