DC-6 Walkthrough

Walkthrough of DC-6 challenge from vulnhub. Initial hints given from reviewing the challenge listing: The name of the host is wordy A password list can be determined using cat /usr/share/wordlists/rockyou.txt | grep k01 > passwords.txt Walkthrough A basic ping sweep finds the machine, throwing a default nmap scan at it finds two ports of interest – SSH (22) & HTTP (80). Of interest in the http headers are the mention of hostname wordy (inline with the initial hint) Wordy added

Read more