Walkthru
A. https://resources.infosecinstitute.com/basic-pentesting-2-ctf-walkthrough/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+infosecResources+%28InfoSec+Resources%29 [brute force passphrases for ssh login, convert private key to another format so we can use john to brute force key ]
B. http://www.hackingarticles.in/hack-the-basic-pentesting2-vm-ctf-challenge/ [use ssh2john to convert this SSH key into a crackable file for john the ripper.]
C. https://medium.com/@nelsoncoln/basic-pentesting-2-vm-walkthrough-383047900187 [vim.basic have root permissions, that means that I could probably read the file in kay’s directory,]
Notes;
A. https://resources.infosecinstitute.com/basic-pentesting-2-ctf-walkthrough/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+infosecResources+%28InfoSec+Resources%29 [brute force passphrases for ssh login, convert private key to another format so we can use john to brute force key ]
B. http://www.hackingarticles.in/hack-the-basic-pentesting2-vm-ctf-challenge/ [use ssh2john to convert this SSH key into a crackable file for john the ripper.]
C. https://medium.com/@nelsoncoln/basic-pentesting-2-vm-walkthrough-383047900187 [vim.basic have root permissions, that means that I could probably read the file in kay’s directory,]
Notes;
[from walktheu B]
python ssh2john key > ssh_login
john ssh_login
Comments
Post a Comment