# Prenote: As all of these challenges were similar, we decided to combine these under one page.

## Flag 1

nmap all ports to see port 4994 is open, just nc to it to get flag

### flag :zh3r0{pr05\_d0\_full\_sc4n5}

## Flag 2

Going back to port 324 (ftp)

the flag is in .../.../.flag

### flag: zh3r0{You\_know\_your\_shit}

## Flag 3

curling port 22 robots.txt gives you a string in base58, decode to get /clue3349203.txt, curl that to get a lot of jsfuck, decode that to get an employee id, and then use that on port 4994 to get the flag

### flag: zh3r0{y0ur\_b0nu5\_i5\_p4id}

## Flag 4

if we scan port 324, we can see it is an ftp server, which allows anonymous login.

ls -a ing gives us a ... dir (wow thanks hq), and then cding into it and ls -a ing again gives us a .stayhidden file. reading this gives us another employee id, which we can use to login to port 4994 again.

### flag: zh3r0{y0ur\_s4l4ry\_wa5\_cr3dit3d}

## Flag 5

nmap, see http port on port 22, curl it to get flag

### zh3r0{shouldve\_added\_some\_filter\_here}
