Activity 4.1: Exploiting Cupcake
Summary
Deliverable 1. Provide a screenshot of your team's version detection scan(s).
sudo nmap -pT:1-100 -sV 10.0.5.23 -ODeliverable 2. Examine any applications that are publicly accessible. What did you find?
Deliverable 3. You should have the versions of at least two applications. Go ahead and hit the internet and see if your group can find:
Deliverable 4. Provide a screenshot similar to the one below that shows your exported googlesheet of nmap scan data against cupcake. Note, the scan in the demo did not show version detection. See if you can figure out how to do that. You will have at least two ports.
Deliverable 5. What potential remote vulnerabilities did your team find?
Deliverable 6. Using the following screenshot as a point of departure. Determine what the target's running kernel version (you would use the uname command for this). Provide a screenshot that shows the major and minor release of the kernel.
Deliverable 7. The following technique exposes the OS release. Show similar screenshots that show:
Deliverable 8. Armed with the contents of /etc/passwd, let's see if we can build a list of likely passwords for the target account. You should end up with 28 passwords in your list. Provide a screenshot that shows how you generated the list as well as the list contents.
Deliverable 9. Show a screenshot of your hydra session as well as a ssh login session using the targeted account. Also dump the contents of user-flag.txt using cat or more.
Deliverable 10. Provide a screenshot that shows the results of the id command as well as the contents of root-flag.txt similar to the one below.
Last updated