CC-Pen Testing

Methodology:

Scanning/Reconnaisance

  • nmap → nmap -A 10.10.51.180

Enumeration

  • Gobuster/Dirbuster

Exploitation

  • Hashcat → hashcat --force -m 1800 /root/List/rockyou.txt --session sha512

Privilege Escalation

  • sudo -l

Capturing the flag

  • user.txt

  • root.txt


Walkthrough

NMAP

First, we do nmap the IP. From the result there is only 2 port open. (22 & 80)

image

Gobuster

Open, port 80 on web, there is only page apache. Maybe we need to dirb. But, I prefer gobuster.

Well, the directory that we found giving us a blank page. Dirb again as /secret is (301) which means a directory.

image

Hashcat

Well, what hash is this? Check it through Hash Analyzer

Next, after found out the hash type, we need to find out the hash mode.

I suggest this website. Hash

image

Privilege Escalation

image
image
image

CONGRATULATIONS, we got the flag.

By AdaniKamal

Last updated