Basic Pentesting 0x01
好的,用户让我总结一下这篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我需要快速浏览文章,抓住主要点。 文章讲的是渗透测试的过程。首先,开放端口有80、22等,然后用gobuster找到了隐藏目录development。接着用Enum4Linux发现了两个用户kay和jan。然后用hydra破解了jan的密码,之后用linpeas找到了kay的SSH文件,并用John the Ripper破解了密码beeswax。最后获得了系统权限。 现在要把这些步骤浓缩到100字以内。要包括主要工具和关键步骤:gobuster找目录,Enum4Linux找用户,hydra破解密码,linpeas找文件,John破解SSH。最后获得权限。 注意不要超过字数限制,同时保持连贯。可能需要调整句子结构,确保信息完整但简洁。 </think> 文章描述了一次渗透测试过程:通过gobuster发现隐藏目录development;使用Enum4Linux枚举出用户kay和jan;利用hydra破解jan的密码;通过linpeas找到kay的SSH文件,并使用John the Ripper破解得到密码beeswax;最终获得系统权限。 2026-4-2 07:11:28 Author: infosecwriteups.com(查看原文) 阅读量:3 收藏

Open ports are:

````
80
22
139
445
8009
8080

````

The question asks the following : What is the name of the hidden directory on the web server(enter name without /)?

Usually when we enumerate web servers we can use a various of tools, my choice is gobuster and using the following command we can find the hidden directory which is called development.

Using the following command we can find the hidden directory:

gobuster dir -u http://10.10.14.221/ -w /usr/share/wordlists/dirb/common.txt

Press enter or click to view image in full size

“Finding the Development directory.”

Next it’s asking us to bruteforce it, and get the username and password.

Get Cyb0rgBytes’s stories in your inbox

Join Medium for free to get updates from this writer.

Remember me for faster sign in

For more enumeration we can use Enum4Linux :

and by running Enum4linux we found out two users as follows :

“Finding Two users : kay & jan”.

trying the username in the question “ What is the username” jan turns out to be correct.

Next is to crack the password, we can try to crack it using hydra and the service we are going to use is SSH!

using hydra in the following command:

hydra -l jan -P /usr/share/wordlists/rockyou.txt ssh://10.10.14.221

after waiting a bit we successfully found a match for the password associated with jan !

Press enter or click to view image in full size

The password of jan, found by Hydra.

after getting the foothold and searching a bit using linpeas for privilege escalation i found out a ssh file for another user :

Finding the hidden SSH file for user “Kay” by enumerating for priviliege escalation using linpeas

but the id_rsa is password protected, here we use john the ripper for getting the password.

by cracking the password we get the credentials for the second user, the password is beeswax

Press enter or click to view image in full size

cracking the SSH File and finding the correct credentials for user “kay”.

by getting the foothold on the system using the other user, we find the last password.


文章来源: https://infosecwriteups.com/basic-pentesting-0x01-92da90895fdb?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh