My File Server: 1 Vulnhub Walkthrough
 
    Lab Environment     Attacker's Machine:   Linux kali 5.3.0-kali2-amd64 #1 SMP Debian 5.3.9-3kali1 (2019-11-20) x86_64 GNU/Linux   Victim's Machine:   My File Server: 1    Mapping the local network to determine the IP of vulnerable machine.  Command Used: arp-scan --local       Nmap Scan   Command Used: nmap -A Victim's IP   Results: samba service on port 445       After knowing the samba service is active I fired up smbmap to enumerate it further.   Command Used: smbmap -H Victim's IP   Result: username - smbuser       I decided for further enumeration and used Nikto to scan the target.   Command Used: nikto -h Victim's IP   Results: /readme.txt       Visited the url to view if something useful can be found in readme.txt   Results: my password is rootroot1       Now I am having username "smbuser" and password "rootroot1" to connect to victim's machine via ssh and when tried to connect it timed out my connection.   So, I thought of generat...
 
