[THM CTF] Industrial Intrusion Warm-up — Breach
作者参与了一个工业控制系统的CTF挑战,详细记录了渗透测试的过程,包括信息收集和端口扫描等步骤。 2025-9-25 08:24:1 Author: infosecwriteups.com(查看原文) 阅读量:9 收藏

ViraSecurity

FREE link HERE!

Introduction

There’s something uniquely intriguing about CTFs that lean away from the familiar world of typical web or binary exploitation and instead drop you headfirst into industrial control systems. When I stumbled on the “Industrial Intrusion” warm-up challenge on TryHackMe, I was hooked by its promise of mixing OT/ICS flavor with classic hacking methodology. I decided to chronicle my process, not just as a simple write-up, but as a reflection of the mindset and pivots that a real-world pentester might experience outside the safety net of standard CTFs.

Step 1: All About Recon

I always start with reconnaissance, and in CTFs like this, the value of a thorough scan can’t be overstated. The challenge description made it clear that open ports would be key, so my first instinct was to run a full port and service scan with Nmap.

nmap -sV -p- 10.10.169.126

When the scan finished, I had a table of open ports that felt both familiar and a little mysterious:

- 22/tcp (SSH) — Always a staple.
- 80/tcp (HTTP) — The front door.
- 102/tcp (Siemens S7 PLC) — Now we’re talking industrial.
- 502/tcp (likely Modbus) — A protocol I’ve seen in SCADA networks.
- 1880/tcp (vsat-control?) — Not your everyday web port. My mind immediately jumped to Node-RED, which often runs here.
- 8080/tcp (HTTP-proxy) — Another web server, maybe an admin…


文章来源: https://infosecwriteups.com/thm-ctf-industrial-intrusion-warm-up-breach-5f3d1b18b4ca?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh