Question: Access Setup Complete the following steps: Open up a new tab on your web lab Begin an SSH session into the target machine by doing

Access Setup
Complete the following steps:
Open up a new tab on your web lab
Begin an SSH session into the target machine by doing the following:
Open a terminal on the attacker machine and run: ssh sysadmin@192.168.6.105-p 22.
This command will attempt to start an SSH session on your target machine.
Enter the password passw0rd when prompted.
After you've successfully logged into the sysadmin account on the target machine, you'll notice your prompt changes to sysadmin:~\ $.
Swap to the root user by entering sudo -s and reentering the password passw0rd.
You should now have the root prompt root:~\ $ that you acquired during your scavenger hunt activity.
Instructions
Fill out the Module 6 Challenge Submission FileLinks to an external site. as you complete this assignment (remember to make a copy of this document before filling it out). You will submit this document as your deliverable for the Challenge.
Your goal for this assignment is to maintain access to the target machine by installing a backdoor. You will then use the backdoor to crack sensitive passwords.
Complete this assignment by following the steps outlined below. Again, some of these steps will require you to research new tools and concepts. Any information you might need can be found using man pages and online searches. Remember: learning new tools on the job is a key skill for IT and security roles.
Step 1: Shadow People
In this step, you'll create a "secret" user named sysd. Anyone examining /etc/passwd will assume that this is a service account, but in fact, you'll be using it to reconnect to the target machine for further exploitation.
Create a sysd user.
Give your user a password (make sure you remember it).
Give your user a system UID (any UID below 1000).
Give your user a GID equal to this UID.
Give your user full sudo access without a password.
Minimize exposure by ensuring that your secret user does not have a home folder.
Test that your sysd user can execute commands with sudo access without a password before moving on.
Try running sudo -l to test. If the terminal does not prompt you for a password, it was a success. Attempt any other commands that require elevated privileges and mark them in your Submission File.
NOTE
If a hacker can rapidly execute commands on a machine with elevated privileges, they can more quickly exfiltrate important data from the target machine.
Step 2: Smooth Sailing
In this step, you'll allow SSH access via port 2222. SSH usually runs on port 22, but opening port 2222 will allow you to log in as your secret sysd user without connecting to the standard (and well-guarded) port 22.
Use Nano to update the /etc/ssh/sshd_config configuration file to allow SSH access via port 2222:
When you open the configuration file, add a secondary SSH port line under port 22.
This will require some research. Start by examining /etc/ssh/sshd_config and using online searches or man pages to learn more about the available configuration options.
Step 3: Testing Your Configuration Update
When you think you've configured things properly, test your solution by testing the new backdoor SSH port. Do the following steps on the target machine:
First, note that the IP address of the target machine is 192.168.6.105. You'll need this for when you attempt to log back into the target machine.
Make sure to restart the SSH service.
Exit the root account, and log off of the target machine (you'll know you're back in your attacker machine when the prompt turns green).
Use your attacking machine to test the new backdoor SSH port:
SSH back into the target machine as your sysd user, but this time change the port from 22 to 2222 using: ssh sysd@192.168.6.105-p 2222
Once you are connected to the target machine over SSH, use sudo su to switch back to the root user.
NOTE
This is an important step. You were able to log out of your root account, and then reestablish a remote session with escalated privileges through a different, un-guarded port.
Company servers that house sensitive information will often use monitoring and hardening tools to closely watch key ports, such as 22 for SSH.
It is also quite difficult for hackers, on their first breached connection, to know the locations of the most sensitive files in a system.
For this reason, hackers must both attempt to mask their activity (as you are doing with your sysd user), and also ensure that they can discreetly revisit a system. This allows them to maximize the amount of data they can take from the target machine.
Step 4: Crack All the Passwords
Next, to strengthen our control of this system, we will attempt to crack as many passwords as we can.
Having access to all the accounts will also allow us to access the system if our other backdoors are closed.
Make sure that you have SSH-ed into the target machine using your sysd account.
Escalate your privileges to the root user.
Use John to crack the

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!