Difference between revisions of "Mr-Robot: 1 ~ VulnHub - Walkthrough"

m (Objective)
m (Discovery)
Line 10: Line 10:
 
== Methodology ==  
 
== Methodology ==  
 
=== Discovery ===
 
=== Discovery ===
 +
<syntaxhighlight  lang=shell-session highlight="8,9,10" line>
 +
 +
</syntaxhighlight><syntaxhighlight  lang=shell-session highlight="" line>
 +
root@kali:~# nmap -O -sT -sV -p- -T5 192.168.56.108
 +
 +
Starting Nmap 7.60 ( https://nmap.org ) at 2018-05-14 22:45 EDT
 +
Nmap scan report for 192.168.56.108
 +
Host is up (0.0011s latency).
 +
Not shown: 65532 filtered ports
 +
PORT    STATE  SERVICE  VERSION
 +
22/tcp  closed ssh
 +
80/tcp  open  http    Apache httpd
 +
443/tcp open  ssl/http Apache httpd
 +
MAC Address: 08:00:27:B4:E3:34 (Oracle VirtualBox virtual NIC)
 +
Device type: general purpose
 +
Running: Linux 3.X|4.X
 +
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
 +
OS details: Linux 3.10 - 4.8
 +
...
 +
</syntaxhighlight>
  
 
=== Entry Point #2 - Port 80 (HTTP) ===
 
=== Entry Point #2 - Port 80 (HTTP) ===

Revision as of 06:28, 15 May 2018

Objective

Find three hidden flags. Acquire 'root' access

Source: [VulnHub.com]

Status: [Work in progress]

Methodology

Discovery

root@kali:~# nmap -O -sT -sV -p- -T5 192.168.56.108

Starting Nmap 7.60 ( https://nmap.org ) at 2018-05-14 22:45 EDT
Nmap scan report for 192.168.56.108
Host is up (0.0011s latency).
Not shown: 65532 filtered ports
PORT    STATE  SERVICE  VERSION
22/tcp  closed ssh
80/tcp  open   http     Apache httpd
443/tcp open   ssl/http Apache httpd
MAC Address: 08:00:27:B4:E3:34 (Oracle VirtualBox virtual NIC)
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.10 - 4.8
...

Entry Point #2 - Port 80 (HTTP)

Recommendations

Appendix A: Vulnerability Detail and Mitigation

Unpatched Software Components
Rating High
Description xxxxxx
Impact xxxxx
Remediation xxxxx


Password Storage
Rating High
Description xxxxxx
Impact xxxxx
Remediation xxxxx