Skip to content

A writeup of my methodology for attempting the Vulnhub Machine Empire: LupinOne

Notifications You must be signed in to change notification settings

gowriswarupk/HTB-Writeups

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 

Repository files navigation

Empire-LupinOne-Writeup

A writeup of my methodology for attempting the Vulnhub Machine Empire: LupinOne

1. The Information Gathering Phase

The first part is focused on gathering the network information for allthe machines involved. This includes confirming the IP address of the machine used for carrying out the attacks, as well as finding the IP addresses of the target machine on the network. After collecting those, the next step for each of the target machine is to collect more information regarding each one such as OS versions, Open ports, and so on.

  • IP addresses / Live hosts Discovery

To locate the IP address of the Machine that will be carrying out the tests, in this case, amachine running Kali OS, the commandif configis used, as shown in the figure below:

nmap-fping

Now we know that the IP address of the Target Machine is: 192.168.216.134 on our network, and the IP address of the Host Machine is: 192.168.216.137. We now move on to find out more about the Target Machine itself.

  • Analysis on Target Machine

The web browser when accessing the machine shows the following content:

L_http-address

nmap banner grabbing as well as further identification is also carried out using the commands, and the output are shown in the figures that follow:

1. nmap −−script=banner 192.168.216.134

2. nmap −A −V −p− −sC −sV 192.168.216.134

3. nmap −A 192.168.216.134

L_nmap-banner grabbing L_nmap-http oly L_nmap-http

As gathered from the outputs posted above, the OS version is displayed as Linux, and the only open ports are ssh and http.

2. The Exploitation Phase

Enumerating the http port option, and from the results from the nmap commands that were previously run, there is one disallowed entry visible named myfiles, which when opened in a web browser shows the following:

About

A writeup of my methodology for attempting the Vulnhub Machine Empire: LupinOne

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors