Vulnix Solution
You can get the Vulnix from here:https://www.vulnhub.com/entry/hacklab-vulnix,48/
root@hacktivism:~# netdiscover -r 192.168.1.0/24
**If you are not familiar with netdiscover , just follow this guide: http://hacktivismbycs.blogspot.com/2017/07/scan-live-hosts-on-network.html
root@hacktivism:~# nmap -sT -p- -Pn -n -v 192.168.10.96 -T5
root@hacktivism:~# smtp-user-enum -M VRFY -U /usr/share/metasploit-framework/data/wordlists/unix_users.txt -t 192.168.10.96
Brute forcing SSH to find the password for the account named “user”.
After that, we could gain the access of the account user over SSH.
We have to copy the generated ssh-key into the /home/vulnix/.ssh/authorized_keys file.
Login to the victim's machine as ‘vulnix’.
Then we have to replace the root_squash flag with no_root_squash. Then reboot it manually.
Once the machine has rebooted, mount the partition again.
On my local machine, as ‘root’:
On the victim's machine:

And finally, we can get the root access on the victim machine.
~CS

Comments
Post a Comment
If you got something from my writings, just put your thoughts out to words...