Chanakya Vulnhub Walkthrough
It was the box where you have to have knowledge about using Nmap , dirb or nitko or gobuster ,ftp, ssh and metasploit .In this box we analyze the ftp connection using wireshark and got credentials and after that we gain access shell using ssh and exploit root permission using metasploit. Breaching Process Finding IP Nmap Enumeration Nmap Deep scan Browsing HTTP service Enumerating directory ftp login Exploitation Generating ssh authorize key Gaining access to shell (ashoka) Reading chrootkit logs (using metasploit) Privilege Escalation chkrootkit Let's Breach Using nmap we scan the network ip in our network nmap -sn ip_range (use root permission to scan ) After sanning there are only five ip that was not hard for me to find we are using NAT in virtualbox after finding the ip we go for Enumeration (this is the phase where you have to see every single piece of information) Browsing the ip we get ...