Kioptrix Level 1 is a beginner level CTF challenge.
You can download this virtual machine from here.
Details of Kioptrix :
Size----186 MB
OS---Linux
Note:
In virtual box, set up a Bridged network (virtual box -> preferences -> network) in networking, put both your Kali and Kioptrix to Bridged network.Fire-up both the machines(Kali and Kioptrix Level 1)
Kioptrix will ask for the logins which we don't know at the moment. This also means we can't find IP of the Kioptrix directly from the Kioptrix machine itself.
Leave the Kioptrix machine as it is and switch to Kali.
First we need to find the IP address of the Kioptrix machine.
We will use the tool netdiscover that comes pre-installed in Kali Linux to identify the IP address.
Command
sudo netdiscover -i eth0
Let's scan this IP address using the tool Nmap (scan will also verify that its the IP of Kioptrix machine)
Command
sudo nmap -sSVC 192.168.233.130
This command will run the scan to perform SYN scan(three way handshake) , Version and OS detection.
*******************************************************************************
First we go with metasploit method.
Port 139 enumeration:
We can see some info about Samba smb.
Fire-up your metasploit using the command msfconsole
We are going for smb version detection module of metasploit , search for the module using the command
search smb_version
Use the command options to see various parameters that need to be filled.
set rhosts 192.168.233.130
and run the scanner.
Let's search if any exploit is present regarding Samba 2.2.1a
I found one on Rapid7.
Payload is set to default.
Use command options to see fields required to be filled.
(It is required to change the payload from default to non-meterpreter shell as the default payload is very unstable and the meterpreter shell will die immediately).
Change the payload using the command
set payload linux/x86/shell_reverse_tcp
To find the root flag scroll down to bottom of this blog.
Happy hacking ;)
**********************************************************************************
Moving to the other method (getting the root without metasploit).
Clone this , according to instructions below.
Instead of Op****ck name I saved it as open
Port 80/443 enumeration :
We see some info about mod_ssl 2.8.4
Search for related exploit on Google and you will see a GitHub repository.
Let's use it in the required/mentioned format(as given in GitHub repository).
Use command
./open 192.168.233.130 443 -c 40
And guess what we are root again.
np971 lacosteargentina,longchamp hrvatska,longchamp athens greece,converse denmark,castaner uk,rab croatia,rab veste femme,boty lakai skate,quay glasögon bågar tx668
ReplyDelete