Lab 7.1 - Exploiting Pippin
Exploiting pippin.shire.org (10.0.5.25)
Passive Recon

Active Recon and Service Enumeration
Check for open ports


Open ports:
Check for port services and versions



Deliverable 1. Provide screenshots of open ports, their services, and their versions.
Browse to the website

Attempt to SSH as admin to the site

Connect to server with FTP


Deliverable 2. Provide screenshots of the services as they respond to client applications like web browsers and command-line clients.
Deliverable 3. Have you found any of the services particularly interesting? Please explain using annotated screenshots and brief captions or descriptions.
Remote Code Execution
Log into FTP with anonymous user

What is Anonymous FTP?
Upload a test file via FTP


Deliverable 4. Upload a test file (give it a distinctive Safe for Work name) and provide proof that you've done so in the form of screenshots of commands and output.
Deliverable 5. Provide evidence of remote code execution such that you can output the systems /etc/passwd file. How did you do this? Are there any accounts of interest? (At this point you should at least have the privileges of the attacked service)



Test your uploaded file in the browser

Loot
Deliverable 6. What did you find and how did you find it? Can you leverage this data to your advantage?



Deliverable 7. You should be able to get into pippin as an authorized user. Provide a screenshot showing your session and cat the user-flag.

Elevation
Deliverable 8. Enumerate this internal data source to determine where and in what fields useful data might exist. You very likely learned about this system in SYS255,265 and SEC260. Break out your old notes and get on with it. Describe what you found. In the end, you are looking for a new identity and a credential.




Crack the Hash!


Last updated