If you looking to start real pentesting and want to hack any box or do real time pentesting I would suggest start with the CTF.
Mr-Robot – CTF Let’s takes this challenge and cracks this CTF. You can get the VM from VulnHub.
If you want to do pentesting on any target you should have to start with these following steps
- Reconnaissance
- Scanning.
- Exploitation.
- Gaining Access.
Let’s start with Reconnaissance and Scanning phase on the target and get the valuable information to use for future steps.
So here I have target IP is “192.168.56.103”. Let’s do Nmap scan to know about the open ports on the target IP.
As we got the nmap result and we found that there are two ports are opened 80 and 443 and Apache service is running on.
Let’s browse this on port 80.
word press admin path found.
Let’s check the Robots.txt file and explore the unhidden paths.
We previously found the huge amount of word list data while exploring robots.txt file.
Before moving the next step we should have to check for removing duplicate value from the fsocity.dic.
Let’s move the next step and figure out the username by bruteforce using burp intruder.
Here we found three correct usernames ELLIOT, elliot, Elliot.
Now it’s time to get the password using same method by burp intruder.
Now it’s time to get the root access on the machine.
We can upload the php shell into wordpress and get the reverse shell on it.
I previously aware about the pentestmonkey php-reverse shell http://pentestmonkey.net/tools/web-shells/php-reverse-shell let’s download this and upload in the .php page.
Boom !!! we got the shell as daemon. Now let's figure out the flags inside the box.
After checking some file systems and folders got that in home > robot folder containing two files as key-2-of-3.txt, password.raw-md5.
Here we got the second flag in key-2-of-3.txt file.
Now the next thing in my mind to go into root folder and get check the what data are stored into.
But wait we don’t have permission. We need to get the root privilege.
No luck to get any clue after all the file systems and folder I checked. Now it’s time to check what applications installed under which privilege.
After checking the all file folders finally got to know that there is nmap installed as root privilege which will useful to get the root privilege.
Great
ReplyDeleteAnand Sir its great you share information like this thanks
ReplyDeleteThis comment has been removed by the author.
ReplyDeleteYour article about software testing is awesome. It helped me to understand the career prospects in software testing industry.
ReplyDeletevulnerability scanner online
I really wanted to develop a brief comment so as to say thanks to you for all the nice pointers you are sharing here. My extensive internet look up has at the end of the day been honored with reputable content to write about with my contacts. I ‘d admit that most of us visitors actually are undeniably lucky to be in a remarkable network with many lovely professionals with useful hints. I feel somewhat lucky to have come across the webpage and look forward to many more excellent moments reading here. Thank you once again for everything.
ReplyDelete24x7 Direct
I just love hacking and wanted to work as a pentester in one of the best penetration testing company so thanks for sharing this blog . I can learn a lot from this blog.
ReplyDelete