After running the Kioptrix virtual machine, the IP address of the machine can be searched through the "netdiscover" that searches for the current network address.
It shows that the machien's IP is 192.168.64.131. The result of the port scan for this IP is as follows.
It can be seen that a total of six well-known ports have been opened. Let's gather more information about port 139, which includes SMB service's information. We can use the command "enum4linux" to list information about samba hosts.
It seems the host has some known usernames and workgroup name's "MYGROUP". But we can not find the Samba's version. Let's try some metasploit script.
We can see that the smb's version is Samba 2.2.1a. Now we can find some exploit code about version 2.2.1a from google. I could get the below exploit code.
Now, let's try another way to exploit the root. We can use command "nikto" to scan the vuln about our host.
Let's find some exploit point about mod_ssl 2.8.4 on exploit DB.
But the exploit code in exploitDB is not working anymore, so in the way, we are going to use the "OpenFuck.c" exploit code from github.
'Penetration Test' 카테고리의 다른 글
Kioptrix Level 4 (1) | 2023.12.22 |
---|---|
Kioptrix Level 3 (0) | 2023.12.21 |
Kioptrix Level 2 (1) | 2023.12.21 |