Posts

Showing posts from August, 2020

DC-2 Walkthrough

Image
Introduction Today we're doing a boot2root pentest walkthrough of the DC-2 machine, created by DCAU7, and hosted at https://www.vulnhub.com/entry/dc-2,311/ . Locating the Target To find the target system on our network, we'll run netdiscover from our attacking system. netdiscover -r 10.0.2.0/24 The target machine is at  10.0.2.23 . Additional Configuration The documentation for this machine indicates that we'll have to add an entry for  dc-2  to our  hosts  file in order to interact with it properly. In Kali, this file is located at  /etc/hosts , so we'll use  nano  to edit the file like so. nano /etc/hosts Now when we enter dc-2 into our web browser, it'll direct us to the right webpage. Scanning and Enumeration The first scan we run will be an nmap scan to determine which ports are open on the target system. nmap -T4 -p- 10.0.2.23 ; nmap -sU -F -T4 10.0.2.23 Two ports are open, so we'll take those ports and plug them into nmap again to get ...

DC-1 Walkthrough

Image
Introduction Today we're going to do a boot2root pentest walkthrough of the DC-1 machine created by DCAU7 and hosted at  https://www.vulnhub.com/entry/dc-1,292/  . For this pentest walkthrough we'll be using two virtual machines, a Kali Linux machine as our attacking system, and the DC-1 machine as our target system. Locating the Target After booting up both machines, the first thing to do is locate the target system on our network, so we run netdiscover from our attacking system. netdiscover -r 10.0.2.0/24 Looks like 10.0.2.20 is our target. Scanning and Enumeration We start our scans with nmap , and scan for open TCP and UDP ports on the target system. nmap -T4 -p- 10.0.2.20 ; nmap -T4 -sU -F 10.0.2.20 Four ports open.  We'll run nmap again against those four ports to get more info. nmap -T4 -A -p22,80,111,58224 10.0.2.20 There's a lot of potential in these robot.txt entries.  We might look through them later. We get a big lead from scans made by the Nessus vu...

LemonSqueezy Walkthrough

Image
Today we're going to do a boot2root pentest walkthrough of the LemonSqueezy machine created by James Hay and hosted at https://www.vulnhub.com/entry/lemonsqueezy-1,473/ . For this pentest, we'll be using two virtual machines, a Kali Linux machine as the attacking system, and the LemonSqueezy machine as the target machine. Locating the Target The first thing we'll do is locate the target machine by running netdiscover from our attacking system. Looks like  10.0.2.19  is our target. Additional Configuration The documentation for this machine tells us to add lemonsqueezy to our hosts file.  That means we're going to use gedit to edit the  /etc/hosts  file on our attacking machine like so. Scanning and Enumeration We start our scans with a quick nmap scan on the target to determine which TCP and UDP ports are open. Looks like port 80 and 5353 are open. We run another nmap scan on these ports specifically to see if we can get more info, ...