CC-Pen Testing
Methodology:
Scanning/Reconnaisance
nmap → nmap -A 10.10.51.180
Enumeration
Gobuster/Dirbuster
Exploitation
Hashcat → hashcat --force -m 1800 /root/List/rockyou.txt --session sha512
Privilege Escalation
sudo -l
Capturing the flag
user.txt
root.txt
Walkthrough
NMAP
First, we do nmap the IP. From the result there is only 2 port open. (22 & 80)
Gobuster
Open, port 80 on web, there is only page apache. Maybe we need to dirb. But, I prefer gobuster.
Well, the directory that we found giving us a blank page. Dirb again as /secret is (301) which means a directory.
Hashcat
Well, what hash is this? Check it through Hash Analyzer
Next, after found out the hash type, we need to find out the hash mode.
I suggest this website. Hash
Privilege Escalation
CONGRATULATIONS, we got the flag.
By AdaniKamal
Last updated