![]() So I thought that there might be some processes which might be running with the “fireman” user. I tried to access this user’s home directory but was not allowed to access it with current user. It can also be seen in the highlighted area in the following screenshot. This user is called “fireman.” I identified it by analyzing the “/etc/password” file. ![]() We already had the shell access of this target machine, but this is not the root of the system.Īfter spending some time and exploring the target machine with the limited shell, I found that there is another user in the target system. ![]() Let’s proceed from the last part of this article. Note that these IP addresses may be different on your network, as these are assigned by the DHCP. We will be using 192.168.1.9 as the target machine IP address and 192.168.1.45 as the attacker’s IP. The techniques used are solely for educational purposes, and I am not responsible if the listed techniques are used against any other targets. I will be using Kali Linux as the attacker machine for solving this CTF. ![]() Please Note: For all of these machines, I have used Oracle Virtual Box to run the downloaded machine. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |