Difficulty: ♦
TAGS: Redis | Vulnerability Assessment | Databases | Reconnaissance | Anonymous/Guest Access
Description: This box exposes a Redis database that has not been removed or is not set up for protected mode. When using Redis, the protected mode allows Redis to use the loopback address as the IP address that is allowed to enter the database. (In other words, only you can access it, all others will get an error).
TASK 1
Which TCP port is open on the machine?***9
- 6379
OBSERVE:
Nmap will only scan the most common and popular 1,000 ports
use option -p- to scan all ports
View comaprison below
TASK 2
Which service is running on the port that is open on the machine?****s
- Redis
TASK 3
What type of database is Redis? Choose from the following options: (i) In-memory Database, (ii) Traditional Database**-****** *******e
- In-memory Database
TASK 4
Which command-line utility is used to interact with the Redis server? Enter the program name you would enter into the terminal without any arguments.*****-**i
- redis-cli
Hide Answer
TASK 5
Which flag is used with the Redis command-line utility to specify the hostname?**
- -h
Hide Answer
TASK 6
Once connected to a Redis server, which command is used to obtain the information and statistics about the Redis server?***o
- info
TASK 7
What is the version of the Redis server being used on the target machine?*.*.7
- 5.0.7
TASK 8
Which command is used to select the desired database in Redis?*****t
- select
Observe:
At the end of the info command in the redis database you will see 0db keys4
Where db indicates the Index and Keys the entries within the index
TASK 9
How many keys are present inside the database with index 0?*
- 4
TASK 10
Which command is used to obtain all the keys in a database?**** *
- keys *
SUBMIT FLAG
Submit root flag********************************
- 03e1d2b376c37ab3f5319922053953eb