Posts

Showing posts from December, 2021

HackMyVM - Icarus

Image
Icarus is a medium difficulty VM by "sml" that I blundered my way through somehow... Quite a nice VM and made me think! Find it └─$ sudo netdiscover -r 10.0.0.0/24 -P [sudo] password for kali:  _____________________________________________________________________________    IP            At MAC Address     Count     Len  MAC Vendor / Hostname  -----------------------------------------------------------------------------  10.0.0.1        08:00:27:95:67:5b      1      60  PCS Systemtechnik GmbH  10.0.0.111      08:00:27:6d:e2:b6      1      60  PCS Systemtechnik GmbH -- Active scan completed, 2 Hosts found. Scan it nmap # Nmap 7.91 scan initiated Wed Dec 29 12:56:30 2021 as: nmap -T4 -p- -sC -sV -oN nmap.out 10.0.0.111 Nmap scan report for 10.0.0.111 Host is up (0.0012s latency). Not shown: 65533 closed ports PORT   STATE SERVICE VERSION 22/tcp open  ssh     OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0) | ssh-hostkey: |   2048 b6:65:56:40:8d:a8:57:b9:15:1e:0e:1f:a5:d0:52:3a (R

HackMyVM - Comingsoon

Image
  Find it └─ $ sudo netdiscover -r 10.0.0.0/24 -P | tee findit [sudo] password for kali:     _____________________________________________________________________________    IP             At MAC Address     Count     Len   MAC Vendor / Hostname         -----------------------------------------------------------------------------   10.0.0.1         08:00:27:96:87:13       1       60   PCS Systemtechnik GmbH   10.0.0.90       08:00:27:03:05:3c       1       60   PCS Systemtechnik GmbH -- Active scan completed, 2 Hosts found.      Scan it └─ $ nmap -T4 -p- -sC -sV -oN nmap.out 10.0.0.90   Starting Nmap 7.91 ( https://nmap.org ) at 2021-12-22 12:49 EST Nmap scan report for 10.0.0.90 Host is up (0.00097s latency). Not shown: 65533 closed ports PORT   STATE SERVICE VERSION 22/tcp open   ssh     OpenSSH 8.4p1 Debian 5 (protocol 2.0) | ssh-hostkey:   |   3072 bc:fb:ec:b8:93:d4:e2:78:76:eb:1b:dc:4b:a7:7f:9b (RSA) |   256 31:41:a0:d7:e9:3c:79:11:c2:f0:81:a0:fe:2d:f9:b0 (ECDSA) |_  

HackMyVm - Rick

Image
  https://hackmyvm.eu/machines/machine.php?vm=Rick Rick is a hard machine written by cromiphi, its a bit awkward to get the first step and get to the first user account, but subsequent user and root is a bit more straight forward.  Find it ┌──( kali㉿kali )-[ ~/rick ] └─ $ sudo ne tdiscover -r 10.0.0.0/24 - P                                       1 ⨯ [sudo] password for kali:     _____________________________________________________________________________    IP             At MAC Address     Count     Len   MAC Vendor / Hostname         -----------------------------------------------------------------------------   10.0.0.1         08:00:27:dd:6d:f0       1       60   PCS Systemtechnik GmbH   10.0.0.55       08:00:27:94:4a:67       1       60   PCS Systemtechnik GmbH -- Active scan completed, 2 Hosts found. Scan it ┌──( kali㉿kali )-[ ~/rick ] └─ $ nmap   -T4 -sC -sV -oN nmap.log 10.0.0.55 Starting Nmap 7.91 ( https://nmap.org ) at 2021-11-29 14:44 EST Nmap scan report for 10.0