Kioptrix 1.1
File name is Kioptrix level 2 - CentOS 4.5
The vuln machine

0. Get machine's IP
sudo netdiscover -r <IP> to scan our network for devices (found 4 hosts - kali, host, vuln machine, vmware)
1. Enumeration
1.1 Enumerate services
1.2 Enum4linux
1.3 Checked http apache webserver at port 443
By right should always check web vulnerabilities last

2. Exploit Action
Here we begin exploiting every attack vector possible : ssh, apache httpd, rpcbind, mysql
2.1. OpenSSH
22/tcp open ssh OpenSSH 3.9p1 (protocol 1.99)
SSH failed to work due to unavailable suitable attack vectors.
2.2 Apache webserver
Searchsploit apache version
mod_ssl is an optional module for the Apache HTTP Server. It provides strong cryptography for the Apache v1. 3 and v2 webserver via the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) cryptographic protocols by the help of the Open Source SSL/TLS toolkit OpenSSL. This fits our purpose :
# Download the exploit to our makeshift directory
Do always try to read the source code to see requirements for exploit, there's so many things you can learn from reading scripts!
For this we stored it in ~/home/searchsploit_stuff as OpenFuck.c

note the requirements of libssl-dev (apt-get install libssl-dev)
Compile with: gcc -o OpenFuck OpenFuck.c -lcrypto (replace OpenFuck.c with the name of your downloaded exploit .c file)


TO BE CONTINUED
Last updated