HackingLab – Kuya 1

EnumerationARP-SCAN
NMAP
NIKTO
LEGION
WebSite EnumerationDIRBUSTER
DIRB
GOBUSTER
Information GatheringWEBSITE BROWSING
DECODING (BRAINFUCK, BASE64)
PCAPNG PACKET DECODING(WIRESHARK)
COMPRESSED FILE Brute ForcingJOHN
SSH HASH Brute ForcingJOHN
Privilege EscalationSSH LOGIN
Password AttacksJOHN

La macchina si scarica all’indirizzo https://download.vulnhub.com/kuya/Kuya.ova ed è configurata per acquisire il proprio indirizzo IP in modalità dinamica DHCP.

Leave a Reply

Your email address will not be published. Required fields are marked *