Posted by shinigami at 07:46
#Information Gathering
Scaning using Netdiscover :
Scanning with Nmap :
result for information gathering:
In address 192.168.2.100:80 I have found some credential information about developer and marketer.
# Service Enumeration
20/tcp closed ftp-data
21/tcp open ftp vsftpd 2.0.4
22/tcp open ssh OpenSSH 4.3 (protocol 1.99)
25/tcp open smtp Sendmail 8.13.7/8.13.7
80/tcp open http Apache httpd 2.0.55 ((Unix) PHP/5.1.2)
110/tcp open pop3 Openwall popa3d
143/tcp open imap UW imapd 2004.357
# Vulnerability Assesment
1. FTP Login Anonymous allowed2. OpenSSH Denial of Service
3. Directory Listing
# Exploitation
First, I'm interesting with FTP login but I dont't get anything in the ftp.
Second, I have try on openSSH with vulnerable DOS. Try using this exploit and the ssh service temporary down. /pentest/exploits/exploitdb# platforms/multiple/dos/2444.sh
Third, I'm trying to directory listing on http service. this part separated into 3 step :
- Create userlisting from available info in their web site.
- Create file listing for common user in linux syste,
- Combination userlisting and filelisting with dirb, dirb available in backtrack.
root@bt:/pentest/web/dirb# ./dirb http://192.168.2.101/ /root/Slax2.100/credential.txt,/root/Slax2.100/filelist.txt -w -l
Dirb usage:
From the dirb, you can see ~pirrip/.ssh/ listing. Then open it from your browser and download the id_rsa and id_rsa.pub. Two files is ssh key authentication. Now connect to the machine target with ssh.
# ssh -i id_rsa pirrip@192.168.2.100
Well, we have connected into target machine. But we don't know what is the password of pirrip.
Finally I'm using grep to find string with password.
# grep -r "Password" /
For the long time, I got the password of pirrip -> 0l1v3rtw1st