Opening
Target: Single service, FTP only.
1sudo nmap -sC -sV -oN nmap/initial 10.129.15.191
121/tcp open ftp vsftpd 3.0.3
2| ftp-anon: Anonymous FTP login allowed (FTP code 230)
3|_-rw-r--r-- 1 0 0 32 Jun 04 2021 flag.txt
nmap’s ftp-anon script confirms anonymous login is permitted and surfaces flag.txt in the root directory immediately. No further enumeration needed.
Development
Connected using the FTP client with anonymous credentials:
1ftp 10.129.15.191
1Username: anonymous
2Password: anonymous
3230 Login successful.
Listed the directory and retrieved the flag:
1ls
2get flag.txt
Closed the session and read the file locally:
1cat flag.txt
Endgame
No privilege escalation required. Anonymous FTP access with a world-readable file is the entire attack surface.
Post-Game Analysis
Anonymous FTP is a legacy configuration that should never appear on an internet-facing host. vsftpd 3.0.3 supports authentication — this is a configuration failure, not a software vulnerability.
The nmap default scripts (-sC) caught this without any additional tooling. Default script scanning should always be part of initial reconnaissance.