Tibetan, Cybersecurity enthusiast, I design and develop website using #WordPress to pay bill.
Tibetan, Cybersecurity enthusiast, I design and develop website using #WordPress to pay bill.
Overview: Target Machine IP Address: 192.168.56.41 My Machine IP Address: 192.168.56.20 Mission: Boot to Root Your target is gain the Root access There is no any flag in this VMs Share root access with me twitter@cybersploit1 This works better with VirtualBox rather than VMware Download: You can download the machine from here. Information Gathering & Scanning Process: sudo arp-scan --interface=eth0 192.168.56.1/24 nmap -sC -sV -p- 192.168.56.41 -o nmap.log PORT STATE SERVICE VERSION 22/tcp open ssh…
Overview: Target Machine IP Address: 192.168.56.42 My Machine IP Address: 192.168.56.20 Mission: THIS IS A MACHINE FOR COMPLETE BEGINNER, THERE ARE THREE FALGS AVAILABLE IN THIS VM. FROM THIS VMs YOU WILL LEARN ABOUT ENCODER-DECODER & EXPLOIT-DB. Download: You can download the machine from here. Information Gathering & Scanning Process: sudo arp-scan --interface=eth0 192.168.56.1/24 nmap -sC -sV -p- 192.168.56.42 -o nmap.log https://www.exploit-db.com/docs/english/44592-linux-restricted-shell-bypass-guide.pdf PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)…
Overview: Target Machine IP Address: 192.168.56.40 My Machine IP Address: 192.168.56.20 Mission: THIS IS A MACHINE FOR COMPLETE BEGINNER, THERE ARE THREE FALGS AVAILABLE IN THIS VM. FROM THIS VMs YOU WILL LEARN ABOUT ENCODER-DECODER & EXPLOIT-DB. Download: You can download the machine from here. Information Gathering & Scanning Process: sudo arp-scan --interface=eth0 192.168.56.1/24 nmap -sC -sV -p- 192.168.56.40 -o nmap.log PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 5.9p1 Debian 5ubuntu1.10 (Ubuntu Linux;…
Overview: Pwned Machine IP Address: 192.168.56.38 My Machine IP Address: 192.168.56.20 Mission: To gain access to root and read the flag file Flag.txt. Download: You can download the machine from here. Information Gathering & Scanning Process: sudo arp-scan --interface=eth0 192.168.56.1/24 nmap -sC -sV -p- -o nmap.log 192.168.56.38 PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0) 80/tcp open http Apache httpd 2.4.29 ((Ubuntu)) 8080/tcp open http BusyBox httpd 1.13…
Overview: Pwned Machine IP Address: 192.168.56.37 My Machine IP Address: 192.168.56.20 Mission: To gain access to root and read the flag file Flag.txt. Download: You can download the machine from here. To know the IP address of the Target Machine: sudo arp-scan --interface=vboxnet0 192.168.56.1/24 Scanning: nmap -sC -sV -p- 192.168.56.37 -o nmap.log Output: PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 3.0.3 22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0) 80/tcp open http Apache…