Posted by shinigami at 02:56
Read our previous post
# Information GatheringIn this part, I will IG the target using Nmap with the command :
# nmap -sS -A 192.168.1.110and return the result ->
# Service Enumeration
FTP (vsftpd)
SSH
CUPS Print
HTTPd
# Vulnerability Assesment
From the Information Gathering and Service Enumeration result, we know that FTP are allowed the user to login anonymously. May be we can get some interesting file inside.
Before, I have trial to get each file on it. But I'm intersting with core file.
Download it and open it, I'm opened it using cat, look scream...
Try to open it with 'strings' command, w00t we got the string of shadow file.
Now separated the shadow string and the other, copy the shadow string and copy it into text editor.
# Exploitation
Now time to crack the shadow, I used John THe Ripper to do this job. And finally, we got it. Enjoy!
No comments:
Post a Comment