Ch4inrulz Walkthrough

Walkthrough of the Ch4inrulz challenge from vulnhub. Walkthrough A netdiscover finds the machine. Running a basic nmap scan (command: nmap -A -T4 192.168.139.130) against it finds a few things of interest. Key items from the scan: There is a FTP instance running that allows for anonymous login. Anonymous login allows any user to access the service. There is a SSH server running There is a web server running, banner information indicates it belongs to ‘Frank’ with nothing in the robots.txt

Read more

DC-6 Walkthrough

Walkthrough of DC-6 challenge from vulnhub. Initial hints given from reviewing the challenge listing: The name of the host is wordy A password list can be determined using cat /usr/share/wordlists/rockyou.txt | grep k01 > passwords.txt Walkthrough A basic ping sweep finds the machine, throwing a default nmap scan at it finds two ports of interest – SSH (22) & HTTP (80). Of interest in the http headers are the mention of hostname wordy (inline with the initial hint) Wordy added

Read more