Difference between revisions of "DC-9"

From Void-Byte
Jump to navigation Jump to search
Line 19: Line 19:
 
File:Dc-9 nmap scan.png
 
File:Dc-9 nmap scan.png
 
</gallery>nikto -host 192.168.50.49
 
</gallery>nikto -host 192.168.50.49
[[File:DC-9 Nikto scan.png|left|thumb|416x416px]]
+
File:DC-9 Nikto scan.png|left|thumb|416x416px
<br />
+
 
 
We can see that the machine is hosting a web page on port 80 lets check it out. <br />
 
We can see that the machine is hosting a web page on port 80 lets check it out. <br />
  
 
===Webpage===
 
===Webpage===
 
<br />
 
<br />

Revision as of 19:58, 12 December 2020

Description

"DC-9 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.

The ultimate goal of this challenge is to get root and to read the one and only flag.

Linux skills and familiarity with the Linux command line are a must, as is some experience with basic penetration testing tools."

You can download the machine at https://www.vulnhub.com/entry/dc-9,412/


Enumeration

Scans

nmap -vvv -p- -sC -sV -T4 -oX dc-9.xml 192.168.50.49 && xsltproc dc-9.xml -o dc-9.html

nikto -host 192.168.50.49

File:DC-9 Nikto scan.png|left|thumb|416x416px

We can see that the machine is hosting a web page on port 80 lets check it out.

Webpage