Skip to content

Basic Pentesting Vulnhub

Reconnaissance

I performed a full port scan and identified three open ports on the target system.

Nmap Scan

Service Enumeration

During enumeration, I identified the FTP service along with its version.

FTP Version

Exploitation

I searched for known exploits corresponding to the identified FTP version and found a relevant exploit module available in Metasploit.

Metasploit Module

Using the appropriate payload, I executed the exploit and successfully gained root access to the system.

Post-Exploitation

After obtaining a shell, I upgraded it to a fully interactive TTY using Python.

I then accessed the /etc/shadow file and extracted password hashes. The hashes were in SHA-512 Unix format.

Using john (John the Ripper), I cracked one of the hashes and recovered the credentials:

  • Username: marlinspike
  • Password: marlinspike

Made by ShuhaibNC with ❤️