# Submit Flag

## <mark style="color:purple;">Submit Flag</mark>

*Submit root flag*

***

### <mark style="color:purple;">How to</mark>

#### <mark style="color:purple;">Port Scanning</mark>

Like in Task 5, we need to run `sudo nmap -T5 -sCV <target_ip>` to get the open ports. In this case, only port 21 is open, running FTP.

***

#### <mark style="color:purple;">Connecting via FTP</mark>

To connect via FTP, we'll use the anonymous user without a password.

```bash
ftp <target_ip>
```

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdnUNxItMcAGj2_OiDqOZ7v3217fXHkV1toFI3JV-gzZv4K4juph1i2DBeP7F4NUw43D-HxUoPp4U54qyGFwKIoQPIjoo2BqvgjIz5aSRb1H3HqfmTSaIiM9x9JtGsZodT0bqZh?key=56lqxiH0KrUFV_mugARDz_E8" alt=""><figcaption><p>ftp &#x3C;target_ip></p></figcaption></figure>

***

#### <mark style="color:purple;">Obtaining the Root Flag</mark>

Now, let's find the root flag and download it.

```bash
ls
get flag.txt
```

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXd-YNNjRlyK4NsqvzaKh2NuX_RhL6SuH5DYxdBeAuAZbG3A-uQiUknkBD1aWmZz-QH8BepuK3leRUvZpzKyj0EnEdYI7vOa4xJytERVl2jG9yPey8fKy4KBJFBeZIkYC5W3hXX3zg?key=56lqxiH0KrUFV_mugARDz_E8" alt=""><figcaption><p>get flag.txt</p></figcaption></figure>

Finally, let's display the flag

```bash
cat flag.txt
```

<figure><img src="https://657071395-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6TULCIQYFngHxc4snxrs%2Fuploads%2FbSalmulBQVQoMZ0f3v9T%2Fimage.png?alt=media&#x26;token=f9b23dfe-9e90-4dfd-be5a-493208fb6c2a" alt=""><figcaption><p>cat flag.txt</p></figcaption></figure>
