kioptrix
-
Hacking Kioptrix Level 2 (#1.1) – Part 3 – Shell access
In the previous post, we bypassed the login using SQL injection. Now, we want to exploit the feature of the application to open a reverse shell. This can be done in other ways as well. Here, I will be listen on port 4444 in my attacker machine (192.168.19.132, since I have installed newer version of… Continue reading
-
Hacking Kioptrix Level 2 (#1.1) – Part 2 – SQL Injection
In the previous post, we tried to identify the possible vulnerabilities of the target machine. In this post, we will be trying to exploit the system. Up to now, we have visited the IP address of the target machine in firefox which gave us two input fields. Now, if we try some random username and… Continue reading
-
Hacking Kioptrix Level 2 (#1.1) – Part 1 – Scanning
We completed the first level of the Kioptrix challenge. Now, we have got to enter the next level of it. So, the link of the Kioptrix Level 2 is https://www.vulnhub.com/entry/kioptrix-level-11-2,23/. We will find an updated version of Kioptrix Level 2 from the link. For the installation and basic troubleshooting please refer to the previous posts.… Continue reading
-
Hacking Kioptrix Level 1 (#1) – Part 4 – Exploit
In the previous post, we entered the target machine exploiting a vulnerability in mod_ssl. However, we want to find some other vulnerabilities as well. In this post, we are using the Metasploit framework to find the vulnerability and exploit. Also, I will be using the root user to run my commands. Starting the Metasploit framework… Continue reading
-
Hacking Kioptrix Level 1 (#1) – Part 3 – Exploit
In the previous post, we performed some scans using Nmap and noted down the results. Now, in this post, I will make use of other ways with the help of existing information. Therefore, let’s try to hit the webserver of the target by opening the IP address of the target 192.168.19.129 in firefox. We saw… Continue reading
-
Hacking Kioptrix Level 1 (#1) – Part 2 – Scanning
Scanning In the previous post, we set up the environment to start our first hacking. Now, in this post, we are actually going to start hack the image. The first step is to gather as much information as you can about the target you are hacking. There might be 0 possibilities of hacking or there… Continue reading