Page cover

wine-glassCAP

Tusmo

  • Baadhitaan

  • User

  • Root

  • Maxaan ka baran kernaa labkaan

Baadhitaan

waatan natiijada nmap, waxaa kali ya furan labo port oo kale ah 22 iyo 80

// Nmap
nmap  -sV -sC -Pn -p- -T4 -oN scan_resalt.md 192.168.119.139
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-01-26 08:49 EST
Nmap scan report for 192.168.119.139
Host is up (0.0017s latency).
Not shown: 65533 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.4p1 Debian 5+deb11u1 (protocol 2.0)
| ssh-hostkey: 
|   3072 f0:e6:24:fb:9e:b0:7a:1a:bd:f7:b1:85:23:7f:b1:6f (RSA)
|   256 99:c8:74:31:45:10:58:b0:ce:cc:63:b4:7a:82:57:3d (ECDSA)
|_  256 60:da:3e:31:38:fa:b5:49:ab:48:c3:43:2c:9f:d1:32 (ED25519)
80/tcp open  http    Apache httpd 2.4.56 ((Debian))
|_http-server-header: Apache/2.4.56 (Debian)
|_http-title: Apache2 Debian Default Page: It works
MAC Address: 00:0C:29:53:27:E5 (VMware)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Sidookale waxaan isku daya inaan brute force ku sameeyo directory’s ka anoo isticmaalaya dirsearch iyo ffuf , wax natiija oo xiiso leh ma’arag

sidoo kale waxaan isku dayay in aan brute foce ku sameeyo usernames, wax natiijo ah ma helin

Baadhitaano kale duwan oo badan waxaan isku dayay ipv6, waxaan raacay guide ka hackticks

nmap natiijadeedii waxaan helney port cusub 113

Waxaan baadhitaan ku sameeyay 113 port, waxaana raaci kartaa hacktricks keeda

Waxaan furtey wiresharak si aan u hubiyo waxa port gaan dhexmaraya

Waxaan search gareeyay port ga, tcp == 113

kadinna waxaan run gareeyay ncat kii

User

waxaan soo helney userka oo ah l…s

waxaan isku dayaynaa in aan brute force ku sameyno passwordka userka, aan soo helney password ka ca…..n

waxaan galney systemka machine ka waxaan isku dayaynaa sidii aan kur uugu qaadi haleyn awoodeena oo aan u noqon laheyn root

Privilege

waxeynu awoodi karnaa in aan damino machine ka

waxaan baadhitaan ku sameeyay /boot folder

grub folder waxaan kasoo dhexheley hash

hash ka ayaan decrpt ku sameeyay anoo isticmaala john iyo worlistiga rockyouu

kadib waxaan isku daayay inaan reboot gareeyo machiinka unasoo galo root iyo starwars, iimeysan shaqeen.

waxaan marlabaad reboor gareeyey machine ka, waxaana doorataa advenced option

waxaad galiayay root iyo starwars, kadib waxaan taabtey e, waxaan iisoo baxxey natiijadaan

waxaan wax ka badaley ro quiet oo aan u badaley rw init=/bin/bash

r=read, w=write

ctrl^x taabo

raxaan soogalay root ka, kadibna waxaan badaley basswordkiisa oo aan u badaley password1

Maxaan ka baran kernaa labkaan

  1. ipv6 attacks oo ah MitM

  2. privilege escalation, iwm

insha Allah waxaan rajeynayaa in ay wax kaa'anfidoonaan alle idinkiis, waxii talo iyo tilmaanba ah waan soo dhameenayaa.

linkedin https://www.linkedin.com/in/ngabalaax/arrow-up-right

Mahadsanid akhriste

Last updated