Difference between revisions of "DC-9"

From Void-Byte
Jump to navigation Jump to search
(added nmap scan)
Line 10: Line 10:
 
<br />
 
<br />
  
== Enumeration ==
+
==Enumeration==
  
  
nmap -vvv -p- -sC -sV -T4 -oX dc-9.xml 192.168.50.49 && xsltproc dc-9.xml -o dc-9.htm
+
nmap -vvv -p- -sC -sV -T4 -oX dc-9.xml 192.168.50.49 && xsltproc dc-9.xml -o dc-9.html
  
l
+
<gallery>
 +
File:Dc-9 nmap scan.png
 +
</gallery>

Revision as of 19:46, 12 December 2020

Description

"DC-9 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.

The ultimate goal of this challenge is to get root and to read the one and only flag.

Linux skills and familiarity with the Linux command line are a must, as is some experience with basic penetration testing tools."

You can download the machine at https://www.vulnhub.com/entry/dc-9,412/


Enumeration

nmap -vvv -p- -sC -sV -T4 -oX dc-9.xml 192.168.50.49 && xsltproc dc-9.xml -o dc-9.html