DC-2 Walkthrough

Introduction Today we're doing a boot2root pentest walkthrough of the DC-2 machine, created by DCAU7, and hosted at https://www.vulnhub.com/entry/dc-2,311/ . Locating the Target To find the target system on our network, we'll run netdiscover from our attacking system. netdiscover -r 10.0.2.0/24 The target machine is at 10.0.2.23 . Additional Configuration The documentation for this machine indicates that we'll have to add an entry for dc-2 to our hosts file in order to interact with it properly. In Kali, this file is located at /etc/hosts , so we'll use nano to edit the file like so. nano /etc/hosts Now when we enter dc-2 into our web browser, it'll direct us to the right webpage. Scanning and Enumeration The first scan we run will be an nmap scan to determine which ports are open on the target system. nmap -T4 -p- 10.0.2.23 ; nmap -sU -F -T4 10.0.2.23 Two ports are open, so we'll take those ports and plug them into nmap again to get ...