Stapler Walkthrough

I started the box with a netdiscover scanNetdiscover -r 192.168.0.0/24 The VM picked up an ip address of 192.168.0.134 Let’s scan it with nmapnmap -sV -Pn -vv -T4 -A -p- 192.168.0.134 –script=auth,brute,discovery,exploit,vuln -oN 192.168.0.134nmap.scan Found some open portsFTP & SSHTCP DNS WebserverMysql with an interesting banner And another webserver SMB enum found a couple shares … Continue reading "Stapler Walkthrough"

Read More

Pwn_init Walkthrough

First I ran netdiscover -r 192.168.0.0/24 Then an nmap scan: nmap -sV -Pn -vv -T4 -A -p- 192.168.0.133 –script=auth,brute,discovery,exploit,vuln -oN 192.168.0.133nmap.scanFound a few open ports: Info about the http server, looks like we found a login form And some additional pages to try RPC info MYSQL info, looks like we got blocked from connecting to … Continue reading "Pwn_init Walkthrough"

Read More

Lord Of The Root Walkthrough

Lord of the Root Vulnhub VM Walkthrough I started off this box with netdiscover: netdiscover -r 192.168.0.0/24 The VM’s ip is 192.168.0.132. Let’s scan it with nmap: nmap -sV -Pn -vv -T4 -A -p- 192.168.0.132 –script=auth,brute,discovery,exploit,vuln -oN 192.168.0.132nmap.scan Looks like there’s only 1 port open, ssh SSH info and a vague OS guess The nmap … Continue reading "Lord Of The Root Walkthrough"

Read More

Kioptrix 1 Walkthrough

Kioptrix 1 VulnHub VM Walkthrough I started with box with a netdiscover scan, found the IP was 192.168.0.130 netdiscover -r 192.168.0.0/24 Then ran an nmap scan and discovered some open ports nmap -sV -Pn -vv -T4 -A -p- 192.168.0.130 –script=auth,brute,discovery,exploit,vuln -oN 192.168.0.130_nmap.scan SSH version Apache version, some OS info and mod_ssl/openssl version An open rcp port … Continue reading "Kioptrix 1 Walkthrough"

Read More