Skip to main content

Posts

ME AND MY GIRLFRIEND: 1 Walkthrough

  ME AND MY GIRLFRIEND: 1  Walkthrough Description : This VM tells us that there are a couple of lovers, namely Alice and Bob, where the couple was originally very romantic, but since Alice worked at a private company, "Ceban Corp", something has changed from Alice's attitude towards Bob like something is "hidden", And Bob asks for your help to get what Alice is hiding and get full access to the company! Difficulty Level: Beginner Notes : there are 2 flag files Learning : Web Application | Simple Privilege Escalation | uses of Burp Suite | Unix Commands Machine Download Link : https://www.vulnhub.com/entry/me-and-my-girlfriend-1,409/ Tools:  Raccoon Nikto Burp Suite NMAP Dirb After downloading the ova file, I imported in Oracle virtual machine, then started my kali machine and my target machine(ME AND MY GIRLFRIEND: 1). Step 1: At first, search my target machine using this command "sudo arp-scan -l." As we saw the result, I found my target machine...
Recent posts

Kali Linux Basic Commands with FileSystem

Kali Linux  is a distribution of Linux specifically designed for penetration testing. It has hundreds of tools preinstalled, saving you the hours it would take to download and install them yourself. Directory is the same as a folder in Windows. A directory provides a way of organizing files, usually in a hierarchical manner.  Home Each user has their own /home directory, and this is generally where files you create will be saved by default.  root Like nearly every operating system, Linux has an administrator or superuser account, designed for use by a trusted person who can do nearly anything on the system. Script is a series of commands run in an interpretive environment that converts each line to source code.  Shell  is an environment and interpreter for running commands in Linux. Terminal is a command line interface (CLI). The Linux Filesystem The Linux filesystem structure is somewhat different from that of Windows. Linux doesn’t have a physical drive (suc...

Vulnerability Assessment and Penetration Testing(VAPT)

   What is a Vulnerability Assessment? A vulnerability assessment is a periodic review of security weaknesses in an information system. It estimates if the system is susceptible to any comprehended vulnerabilities, allocates severity levels to those vulnerabilities, and suggests remediation or mitigation , if and whenever required. Also, using  a risk-based method, vulnerability assessments may target different layers of technology and systems, the most common being host-, network, and application-layer, the infrastructure of network reviews. There are several types of vulnerability assessments. These include: Host-based assessment – The review of critical servers, which may be vulnerable to attacks if not adequately tested or not generated from a tested machine image. Network and wireless assessment – The assessment of policies and practices to prevent unauthorized access to private or public networks and network-accessible resources. Database assessment – The assess...