The video below shows a demo of how to exploit the Metasploitable Linux using a backdoor. After the gaining of access, we then show a few commands in Linux that a hacker can run. In addition to that, we also check the permissions associated with the user profile we have accessed and surprise, surprise, it's Amy Acker (read Root).
After that, we then show u the contents of /etc/passwd and /etc/shadow- which when brought together give u the passwords file. However, we won't be getting the passwords file that way. There is a much simpler way I call "Post-exploit exploits". Among these, is one nifty one called gather/hashdump used to gather/get a hashdump of the passwords file.
We then take this hashdump to john (also known as john-the-ripper to others) who then proceeds to crack the passwords. In our case, the passwords used are quite simple so the process of cracking won't take much time. However, the more difficult to guess the password is, the harder it is to crack.
After we get a set of passwords and their respective usernames, we then use one of them to connect to the Metasploitable VM using telnet. In this case we chose the userid "user" which has the password "user".... Anyway, so you basically enter those credentials when using telnet, ssh or any other remote connection protocol listed in the nmap scan we did initially and hey! bob's your uncle.
After that, we then show u the contents of /etc/passwd and /etc/shadow- which when brought together give u the passwords file. However, we won't be getting the passwords file that way. There is a much simpler way I call "Post-exploit exploits". Among these, is one nifty one called gather/hashdump used to gather/get a hashdump of the passwords file.
We then take this hashdump to john (also known as john-the-ripper to others) who then proceeds to crack the passwords. In our case, the passwords used are quite simple so the process of cracking won't take much time. However, the more difficult to guess the password is, the harder it is to crack.
After we get a set of passwords and their respective usernames, we then use one of them to connect to the Metasploitable VM using telnet. In this case we chose the userid "user" which has the password "user".... Anyway, so you basically enter those credentials when using telnet, ssh or any other remote connection protocol listed in the nmap scan we did initially and hey! bob's your uncle.
Comments
Post a Comment