Metasploitable 2 – Password Hash Cracking with John the Ripper

This post assumes you have access to a the target filesystem in question and want to extract and then crack the password hashes from the local machine. In this example I am going to crack the account passwords used in Metasploitable 2 but the techniques here can be used in many different scenarios. John the […]

Read More Metasploitable 2 – Password Hash Cracking with John the Ripper

Metasploitable 2 – Compromise: Root Shell

Remember our Nmap results? (https://securityaspirations.com/2017/06/25/metasploitable-2-system-recon/) One of the entries in there was listed as follows: 1524/tcp  open  shell       Metasploitable root shell This is probably one of the simplest Metasploitable vulns. There is a root shell open on the box, lets see if we can connect to it with telnet telnet 192.168.168.134 1524 Telnet <dest_IP> <dest_Port> […]

Read More Metasploitable 2 – Compromise: Root Shell