Question: CBR 2 0 3 A Linux, Application Security and Cryptography Challenge - Infiltration Introduction Objective Infiltration - The object of this next challenge is to
CBR A Linux, Application Security and Cryptography
Challenge Infiltration
Introduction
Objective
Infiltration The object of this next challenge is to gain access to the User network from the DEV network.
Overview
Level Intermediate
Skills Needed Network Fundamentals, Password Cracking, Metasploit, Linux
Goal Gain access to the User network using brute force password cracking and enumeration.
Known Networks
Tools Used Nmap, Metasploit, Hydra, ProxyChains, netWindows CLI utility Open Infosec Challenge Infiltration
Create a Document to post to Canvas
Add the list of open ports, protocols, operating system, and application information
to your document ie as much information as you can find You may find that all
ports are closed on
Use Reverse TCP exploit to gain access to
Once you gain access, ls the files in the directory and post a screenshot to your
document
Find the three flags in each users home directory
List all the running processes on
Find out who you are logged in as Find the last time root was logged in
Anything from this point is extra credit
Attempt to find users, groups, and encrypted passwords
Run Nmap from within Metasploit
Find devfs server Shares
Find anything else of interest and add it to your document
Post your Document to Canvas
Challenge Infiltration
Challenge
Start the lab by clicking the Start button and when the environment is ready, log into the virtual machine with the below credentials.
Username: student
Password: @ttckr
Use multihandler in metasploit to catch a reverse connection on port This connects to the DEV network where the challenge starts.
Challenge #
Challenge #
What is the flag hidden in Junior's account folder?
Skip
Challenge #
What is the flag hidden in Maxine's folder?
Skip
Challenge #
What is the flag on the file server share?
Skip
Challenge #
What is the flag in the account home folder of the machine on the user network?
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
