Kioptrix 1
Introduction
This Kioptrix VM Image are easy challenges. The object of the game is to acquire root access via any means possible (except actually hacking the VM server or player). The purpose of these games are to learn the basic tools and techniques in vulnerability assessment and exploitation. There are more ways then one to successfully complete the challenges.
Reconnaissance
Using google fu to find the Kioptrix VM Image and install in the virtual machine. From here, we assume that we have the network of targeted machine. (NAT = 192.168.88.128).
Scanning
Starting scanning the network using nmap.
nmap -T4 $IP/24 or can use arp-scan -l


Since we get the result of targeted machine and it appear to have 1 active host (kioptrix). Proceed with enumeration to gain more information.

Gaining Access
Possible Access Via SMB

Need to identify which version of this machine. Using metasploit smb_version
.

From this information, we notice that the version got vulnerabilites on trans2open.

Using searchsploit to find script that been done before. I'm using 22469.c
exploit.

Maintaining Access
Create new user.
Put backdoor (automatically create user in crontab).
Conclusion
This machine are vulnerable to buffer overflow in Samba version 2.2.1a.
Last updated