Network challenges


All challenges listed here are about finding network related information, live hosts and services.

Submit your solution here (only for the network challenges with flag):



Difficulty levels:

Network information


Info 1.
Find the email address of the owner of hackingarena.no!
Solution
Video solution
Info 2.
Find the nameservers that are responsible for the hackingarena.com domains!
Solution
Video solution
Info 3.
Find all subdomains of hackingarena.com!
Solution
Info 4.
Find the ip addresses of all hackingarena.com related servers!
Solution
Info 5.
Find the network range and the owner of the range of hackingarena.com!
Solution
Video solution
Info 6.
What was the function of hackingarena.com in 2007?
Solution
Video solution
Info 7.
List the ip history of hackingarena.com!
Solution
Info 8.
Do a reverse dns lookup for www.hackingarena.com and find all other domains for the same ip!
Solution

Port scanning


Port 1.
Ask the computer names from the dns server in the /24 network range of uio.no and find the playground!
Solution
Video solution
Port 2.
Determine the possible operating system types of all hackingarena servers using the TCP TTL value!
Solution
Port 3.
How many regular ports are open on the hackingarena.com related servers?
Solution
Video solution
Port 4.
Find all regular web services in the /24 network range of hackingarena.com!
Solution
Port 5.
How many tcp ports are open on the jabba.hackingarena.com server (considering all ports)?
Solution
Port 6.
How many tcp ports are open in the port range 1-1000 on all hackingarena.com servers?
Solution
Port 7.
Find the hidden service on the kenobi.hackingarena.com server in the port range 20000-25000 and obtain the flag!
Solution
Port 8.
Find the hidden service on the kenobi.hackingarena.com server in the port range 25000-30000 and obtain the flag!
Solution

Get in touch with services


Touch 1.
Find the ssh service on jabba.hackingarena.com in the portrange 800-900. Morten is a user of that service. His password is an A-HA song title. (format: Capital for each starting letter without spaces e.g. TakeOnMe )
Solution
Touch 2.
There's a service somewhere on the palpatine.hackingarena.com server in the portrange 15000-20000. Find it and log in to get the flag!
Solution
Touch 3.
It looks like there's a vulnerable service on the kenobi.hackingarena.com server on port 812. The flag is inside the flag.txt file but you need an exploit. Hmmm... What about checking the arena exploit database here: https://hackingarena.com/arena-exploits
Solution
Touch 4.
Log in to the ssh service on the http://jabba.hackingarena.com port 826. The admin user has one of the most common passwords.
Solution
Touch 5.
The kenobi.hackingarena.com server has another vulnerable service on port 813. The flag is inside the flag.txt file. Check again the arena exploit database: https://hackingarena.com/arena-exploits
Solution

Challenges without solution


Network 1.
Network 2.