Difference between revisions of "DC-9"

From Void-Byte
Jump to navigation Jump to search
Line 17: Line 17:
 
<gallery widths="500" heights="400">
 
<gallery widths="500" heights="400">
 
File:Dc-9 nmap scan.png
 
File:Dc-9 nmap scan.png
</gallery>nikto -host 192.168.50.49
+
</gallery>nikto -host 192.16
[[File:DC-9 Nikto scan.png|thumb|DC-9 Nikto scan]]
 
<br />
 

Revision as of 19:52, 12 December 2020

Description

"DC-9 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.

The ultimate goal of this challenge is to get root and to read the one and only flag.

Linux skills and familiarity with the Linux command line are a must, as is some experience with basic penetration testing tools."

You can download the machine at https://www.vulnhub.com/entry/dc-9,412/


Enumeration

nmap -vvv -p- -sC -sV -T4 -oX dc-9.xml 192.168.50.49 && xsltproc dc-9.xml -o dc-9.html

nikto -host 192.16