# NetKotH Workshop (Presentation) **Getting on the Scoreboard with Metasploitable 2** Welcome to the NetKotH workshop! This is a **hands-on, network-based CTF** focused on *real systems*, not flags. Your first target is **Metasploitable 2**, an intentionally vulnerable Linux VM. --- ## 🏁 Workshop Goal By the end of this workshop, **everyone should be on the scoreboard**. That means: * You successfully **gain access** to the target VM * You **plant your team identifier** where the scoring system can see it * The scoreboard credits your team You do **not** need to fully own the system to succeed. --- ## 🧠 What NetKotH Is (and Isn’t) ### This IS: * A **network King-of-the-Hill** style competition * About **enumeration, exploitation, and control** * Collaborative and beginner-friendly ### This is NOT: * A “find the flag” CTF * About memorizing exploits * About being stealthy or perfect If you’re confused at any point, that’s expected. --- ## 🧰 Tooling You’ll Use Today Required: * Kali Linux (or similar) OR * `nmap` * `telnet` * Metasploit Framework * Terminal * Browser / `curl` Not required (today): * Burp * Wireshark * Ghidra * Custom exploit dev --- ## 🧭 When You’re Stuck If nothing is working: 1. Re-read your Nmap output 2. Try a *different service* 3. Search exploit + version 4. Ask: * “What’s the easiest thing here?” 5. Ask a neighbor or facilitator Getting stuck is part of the process. --- ## 🚦 Rules & Safety * Only attack systems **explicitly part of NetKotH** * Do not scan or exploit external networks * Respect workshop boundaries --- ## 🎯 Target * **VM:** Metasploitable 2 * **OS:** Vulnerable Linux * **Purpose:** Learning exploitation basics * **Expectation:** It *will* break easily --- ## 🔁 The NetKotH Attack Loop You will repeat this loop constantly: 1. **Discover** the target 2. **Enumerate** services 3. **Exploit** something simple 4. **Gain access** 5. **Plant your team tag** 6. **Score points** --- ## 🔍 Step 1: Discover the Target You need the IP address of Metasploitable 2 on the NetKotH network. Once you have an IP, confirm it’s alive: ```bash ping ``` If it responds, move on. --- ## 📡 Step 2: Enumerate Services Run a port scan to see what’s exposed: ```bash nmap -sV ``` Pay attention to: * **Open ports** * **Service names** * **Version numbers** You are looking for: * Old software * Plaintext services (FTP, Telnet) * Anything that “shouldn’t” be open --- ## 🧠 Step 3: Pick the Easiest Path In Metasploitable 2 is intentionally vulnerable. Common weak points include: * Telnet * FTP (vsftpd) * Samba (SMB) * Old web apps 👉 **Do not overthink this.** Pick the **simplest** looking service first. --- ## 🛠️ Step 4: Exploit [[choose your own adventure]] --- ## 🧗 Step 5: Gain Control Once you have access: * Explore the filesystem * Check your permissions * Look for writable locations Useful commands: ```bash whoami pwd ls ``` You do **not** need root to score — just control. --- --- ## 🏷️ Step 6: Plant Your Team Tag (Scoring) NetKotH scoring is based on **control**, not flags. You will add you team identifier to the file being servered at the root domain. Only that main file will be visible to the scoring system. Example: ```bash echo "YourTeamName" > /var/www/html/team.html ``` Verify it is accessible: ```bash curl http:// ``` When successfull, the scoreboard should register your team. --- ## 📊 Step 7: Check the Scoreboard Once your tag is detected: * Your team should appear on the scoreboard * You have officially “scored” 🎯 **You’re done with the workshop objective** Anything beyond this is bonus learning. ## 🧠 Final Notes * Success today = **learning + scoreboard entry** * You do not need to “win” * Small wins count * Curiosity beats experience Welcome to NetKotH — now lets hack the planet. 🏴‍☠️