February 4, 2022 | 16:04

INE Lab - Linux Remote Exploitation

The scenario is described as follows: In this lab environment, the user will access a Kali GUI instance. A vulnerable application can be accessed using the tools installed on Kali on: http://demo.ine.local http://demo2.ine.local http://demo3.ine.local http://demo4.ine.local Dictionaries to use: /usr/share/metasploit-framework/data/wordlists/common_users.txt /usr/share/metasploit-framework/data/wordlists/unix_users.txt demo.ine.local TCP port 25 (SMTP) is open: root@INE:~# nmap -vv -p- -T4 demo.ine.local [...] PORT STATE SERVICE REASON 25/tcp open smtp syn-ack ttl 64 MAC Address: 02:42:C0:20:62:03 (Unknown) [. Read more

© Pavel Pi 2021

Powered by Hugo & Kiss'Em.