My File Server: 1 Vulnhub Walkthrough
Lab Environment Attacker's Machine: Linux kali 5.3.0-kali2-amd64 #1 SMP Debian 5.3.9-3kali1 (2019-11-20) x86_64 GNU/Linux Victim's Machine: My File Server: 1 Mapping the local network to determine the IP of vulnerable machine. Command Used: arp-scan --local Nmap Scan Command Used: nmap -A Victim's IP Results: samba service on port 445 After knowing the samba service is active I fired up smbmap to enumerate it further. Command Used: smbmap -H Victim's IP Result: username - smbuser I decided for further enumeration and used Nikto to scan the target. Command Used: nikto -h Victim's IP Results: /readme.txt Visited the url to view if something useful can be found in readme.txt Results: my password is rootroot1 Now I am having username "smbuser" and password "rootroot1" to connect to victim's machine via ssh and when tried to connect it timed out my connection. So, I thought of generat...