OverPass2
Target Details
IP: 10.10.145.49
Analyze pcap file
Download pcap file
Open with wireshark
Follow TCP streams, you'll find all the answers to the questions
Crack Hashes from the WireShark packets
Download fasttrack wordlist
Dump users from shadow file while analyzing packets in
shadow_dump.txt
fileUser Shadow File Passwords using John
user hashes are stored in
shadow_dump.txt
fileUsernamePasswordbee
secret12
szymex
abcd123
muirland
1qaz2wsx
paradox
secuirty3
Get hash from packet file and hard coded salt from
ssh-backdoor
GitHub repoStore them in
hash.txt
file inhash:salt
formatCrack using John
UsernamePasswordjames
november16
Hack Again
Login using Backdoor SSH, since we already know the password
Get User Flag
On listing hidden files, we get
.suid_bash
which can be run as rootWe've rooted the machine
Get root flag
Last updated