Lab 7.1: Exploiting pippin.shire.org (10.0.5.25)
Deliverable 1. Provide screenshots of open ports, their services and versions.
Deliverable 2. Provide screenshots of the services as they respond to client applications like web browsers and command line clients.
Deliverable 3. Have you found any of the services particularly interesting? Please explain using annotated screenshots and brief captions or descriptions.
Deliverable 4. Upload a test file (give it a distinctive Safe for Work name) and provide proof that you've done so in the form of screenshots of commands and output.
Deliverable 6. What did you find and how did you find it? Can you leverage this data to your advantage?
Deliverable 7. You should be able to get into pippin as an authorized user. Provide a screenshot showing your session and cat the user-flag.
Deliverable 8. Enumerate this internal data source to determine where and in what fields useful data might exist. You very likely learned about this system in SYS255,265 and SEC260. Break out your old notes and get on with it. Describe what you found. In the end, you are looking for a new identity and a credential.
Deliverable 9. The credentials you've found are not terribly useful by themselves, you will need to use advanced hash cracking techniques to get what you need. There are very few references on how to get this done, but the following link might push you in the right direction and might possibly make you $25.
Deliverable 10. Prove that you have interactive access as root and can display the root flag.
Last updated