![]() The nmap results can be seen in the screenshot given below:Īs we can see above, there are a lot of open ports and services available on the target machine. I conducted an nmap full-port scan for this purpose. The next step is to find the open ports and services available on the victim. Please note: The victim and attacker machine IP addresses may be different, as per your network configuration. The netdiscover command output can be seen in the screenshot given below:Īs we can see above, we found the victim machine’s IP address: 192.168.1.21 (the attacker IP address is 192.168.1.14). On Kali - the attacker machine - I ran the. Now, the first step is to find out its IP address. Enumerate the web application with the dirbĪfter downloading the file server VM that will be our victim, we run it in VirtualBox.Enumerate another FTP service running on a different port. ![]() Find the IP address of the victim machine with the netdiscover.The techniques used are solely for educational purposes, and I am not responsible if the listed techniques are used against any other targets. I am using Kali Linux as an attacker machine for solving this CTF. Please note: For all of these machines, I have used Oracle VirtualBox to run the downloaded VMs. I highly suggest attempting them, as it is a good way to sharpen your skills and also learn new techniques in a safe environment. You can download vulnerable VMs from this website and try to exploit them. It aims to provide users with a way to learn and practice their hacking skills through a series of challenges in a safe and legal environment. There are two prerequisites to attempt this challenge: having some knowledge of Linux commands and the ability to run some basic penetration testing tools.įor those who are not aware of the site, VulnHub is a well-known website for security researchers. There was no further clue or information provided by the author on VulnHub, but all of the CTFs have the common goal of gaining root privileges on the target machine. It has been added in the reference section of this article. The torrent downloadable URL is also available for this VM.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |