Session 06
Vulnerable Machine I
Unless you've done some Hack The Box machines, this is your first vulnerable machine you'll try to break into and find the flag.txt file.
To make things a bit easier and straight-forward, here's a suggested list of tools that might help you accomplish the task, in no particular order:
nmapdirb(Dir Buster)john(John the Ripper)hydracurlftpsshfirefox(or any browser, really)hash-identifier
In the lab, the machine will be set up for you, and you'll be given a unique IP address for your group (2-3 students) to work on.
After the lab, if you're interested, you'll have the option to copy the machine to a USB stick and work on it in your own time. The VM is in an importable OVA format, ready to be imported into VirtualBox. The size is ~1.5GB.
Remember the different attack steps from the previous lectures, and which ones you will apply here.
Think: "What's the first thing I need to do to get information about the target?"
For the most part, you'll be on your own, and I'll come around and check on you. If you are stuck, let me know, and I'll try to help without giving away too much.