Activity 4.1: Exploiting Cupcake
Part 1: Active Recon


Deliverable 1. Provide a screenshot of your team's version detection scan(s).
Deliverable 2. Examine any applications that are publicly accessible. Report on what you find.
Deliverable 3. You should have the versions of at least two applications. Go ahead and hit the internet and see if your group can find:

Part 2 - Dealing with Targets and Scans
Organize the results of your scans



Deliverable 4. Provide a screenshot similar to the one below that shows your exported googlesheet of nmap scan data against cupcake.

Part 3: Vulnerability Detection
Apache 2.1.15 VulnerabilitiesOpenSSH 5.3 VulnerabilitiesDeliverable 5. What potential remote vulnerabilities did your team find?
Part 4 - Remote Code Execution Vulnerability
Testing the Vulnerability
Deliverable 6. Using the following screenshot as a point of departure. Determine what the target's running kernel version (you would use the uname command for this). Provide a screenshot that shows the major and minor release of the kernel.

Deliverable 7. The following technique exposes the OS release. Show similar screenshots that show:

/usr/bin/whoami

/sbin/ifconfig

code behind the status cgi

contents of /etc/passwd

Part 5: The foothold



Use Hydra to Crack the Password!

SSH to Cupcake with the username

Cat the User Flag file

Last updated