Difference between revisions of "Mr-Robot: 1 ~ VulnHub - Walkthrough"
m (→Discovery) |
m (→Discovery) |
||
Line 12: | Line 12: | ||
<syntaxhighlight lang=shell-session highlight="8,9,10" line> | <syntaxhighlight lang=shell-session highlight="8,9,10" line> | ||
− | </syntaxhighlight><syntaxhighlight lang=shell-session highlight="" line> | + | </syntaxhighlight><syntaxhighlight lang="shell-session" highlight="" line> |
root@kali:~# nmap -O -sT -sV -p- -T5 192.168.56.108 | root@kali:~# nmap -O -sT -sV -p- -T5 192.168.56.108 | ||
Revision as of 05:29, 15 May 2018
Contents
Objective
Find three hidden flags. Acquire 'root' access
Source: [VulnHub.com]
Status: [Work in progress]
Methodology
Discovery
root@kali:~# nmap -O -sT -sV -p- -T5 192.168.56.108
Starting Nmap 7.60 ( https://nmap.org ) at 2018-05-14 22:45 EDT
Nmap scan report for 192.168.56.108
Host is up (0.0011s latency).
Not shown: 65532 filtered ports
PORT STATE SERVICE VERSION
22/tcp closed ssh
80/tcp open http Apache httpd
443/tcp open ssl/http Apache httpd
MAC Address: 08:00:27:B4:E3:34 (Oracle VirtualBox virtual NIC)
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.10 - 4.8
...
Entry Point #2 - Port 80 (HTTP)
Recommendations
Appendix A: Vulnerability Detail and Mitigation
Rating | High |
Description | xxxxxx |
Impact | xxxxx |
Remediation | xxxxx |
Rating | High |
Description | xxxxxx |
Impact | xxxxx |
Remediation | xxxxx |