Friday, November 09, 2012

Lab 2 De-ICE v1.0 (1.100)

Information Gathering




Service Enumeration

based on the picture, i found 2 host 192.168.1.20 that's my ip and 192.168.1.100 is ip target, and I also found some port open, such as port ftp (but the ftp is broken), ssh, smtp, http, pop3, and imap. And some vulner of PHP, etc.
-->

Vulnerability Assasement

So I try to use exploit db to search exploit for the vulnerability and I found 1 exploit for ssh 4.3 but it not works to enter into the system.


and i've also tried to enter through ftp but it not works, because the ftp is broken.
-->


Then, open the web page to get more information.


Exploit

In the web page, I found some names, so I will try to make a list of users and I will use it to brute force the ssh. Here I use hydra to brute force the ssh service.




I found username and password for ssh.
then enter into the system use user bbanter and password bbanter via ssh.
I try to see the /etc/shadow because I'm not on the root but I have a problem with the permission so I try to see the /etc/passwd to see the users.




I founds some user and save it. Then I will brute force the ssh using hydra again to gain high permissoin because on user bbanter I can't do many thing.
then save the output. Here I found password nostradamus for user aadams.



Try to connect via ssh again using aadams and password nostradamus.
Then I try to see the /etc/shadow/



then, crack the password using jtr.



Here I found the password tarot for root, so gain the high access


until here I successfully gain high access (on root). But the hint on the web page, we have to get the CEO's bank account information.


No comments:

Post a Comment