May 7, 2022 | 13:10

INE Lab - Linux Local Enumeration

The scenario is described as follows: The user will access a ubuntu instance as a student user. We will assume that we have compromised a machine and gained regular user access (student). We need to conduct local enumeration and obtain root access to the machine. Objective: Find the SUID executables and vulnerable services to gain the root privileges. LinEnum is located within /opt: student@INE:~$ /opt/LinEnum/LinEnum.sh > linenum.txt student@INE:~$ more linenum. Read more

February 4, 2022 | 16:04

INE Lab - Linux Remote Exploitation

The scenario is described as follows: In this lab environment, the user will access a Kali GUI instance. A vulnerable application can be accessed using the tools installed on Kali on: http://demo.ine.local http://demo2.ine.local http://demo3.ine.local http://demo4.ine.local Dictionaries to use: /usr/share/metasploit-framework/data/wordlists/common_users.txt /usr/share/metasploit-framework/data/wordlists/unix_users.txt demo.ine.local TCP port 25 (SMTP) is open: root@INE:~# nmap -vv -p- -T4 demo.ine.local [...] PORT STATE SERVICE REASON 25/tcp open smtp syn-ack ttl 64 MAC Address: 02:42:C0:20:62:03 (Unknown) [. Read more

© Pavel Pi 2021

Powered by Hugo & Kiss'Em.