![]() Īs we can see above, we’ve got the virtual machine IP address: 192.168.1.122 (the victim machine IP address). The netdiscover command output can be seen in the screenshot given below. ![]() So, now that we have all the information that we need, let us get started with the challenge.Īfter downloading and running this machine on VirtualBox, the first step is to explore the VM by running the netdiscover command to get the IP address of the victim machine. Get the reverse shell of the victim machine.Upload the shell and get the reverse connection.Open the FTP port by using the port-knocking sequence.Identify the local file inclusion vulnerability (LFI) and use it for more enumeration.Enumerate HTTP service with Dirb and Nikto Vulnerability Scanner.Scan open ports by using the nmap scanner.Get the victim machine IP address by running the netdiscover utility. ![]() The summary of steps required for solving this CTF is given below. The techniques used are solely for educational purposes, and I am not responsible if the listed techniques are used against any other targets. I am using Kali Linux as an attacker machine for solving this CTF. Please note: For all of these machines, I have used Oracle Virtual Box to run the downloaded machine. It’s been added in the reference section of this article. The torrent downloadable URL is also available for this VM. I have also provided a downloadable URL for this CTF you can download the machine and run it on VirtualBox. You can check my previous articles for more CTF challenges. As you may know from previous articles, VulnHub is a platform which provides vulnerable applications/machines for learners to gain practical hands-on experience in the field of information security.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |