first we must get information step by step..
- Information Gathering and Service Enumeration
- Vulnerbality Assesmant
- Exploitation
- Privilege Escalation
- Information Gathering and SE
Probe using nmap
we can get IP after runing PWNOS in VirtualBox, see this screenshot
oke,, next we probe an another information like port open and os version
probe using zenmap
we get information 5 port open is webmin Miniserv 0.01, ftp samba 3.x, webservice apache 2.2.4 and ssh.
- Vulnerbalyti Assesmant
probe using Exploit-database and nessus
ahay... we get many information from lebrary exploit-database and information level vulnerabelity from nessus..
oke.. lets to try exploit using metasploit console.. try webmin
yup,, we try use auxillary/admin/webmin/file_disclousure and show options
we must set RHOST.. 192.168.56.101
oke,, tay to exploit..
yes.. it sucsesfully
we get many user .. but its not first experimen... try and try if you field..he hehe
oke.. let do Privilege Escalation.
probe using john the ripper..
before escalation, we must get User and Password.. how to get it ??
set PATH from etc/password to etc/shadow
look at, we get information user and password..
copy from rott until last...create file.txt
next.. try escalation using jhon
before use john.. add wordlists.. couse in BlackBox notyet.. we must added
he he.. password cracking proses complite.. but ohh noo.. password not cracked couse wordlists nothing macth..
conclusion: password not cracked couse nothing wordlist macth
Tidak ada komentar:
Posting Komentar