This forum is in archive mode. You will not be able to post new content.

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - orangetan

Pages: [1]
1
Beginner's Corner / Re: What exploit to use for this target?
« on: November 20, 2015, 08:29:47 AM »
th31nitiate,

I have tried to do test FTP port 21 connections on 172.19.19.2, but i got the following: see the picture below.

When is the service 421 not available, what can I do to gain access to this ftp?

Thanks

regards


2
Beginner's Corner / What exploit to use for this target?
« on: November 19, 2015, 10:33:18 AM »
Hi, I am trying to complete a hacking tutorial in a virtual environment.

The target is 172.19.19.2 and is a Accounts computer.

I have also done a nmap scan on 172.19.19.2 using kali linux with the command: nmap -sS -A -O 172.19.19.2: see nmap scan result 01.PNG and nmap scan result 02.PNG.

It is confirm the Accounts computer is under domain iptlabs.com and I can do a remote desktop connection to 172.19.19.2, but I
do not have username and password. The host is confirm to be running windows 7 ultimate. There appears to be administrator account enabled but i do not know the password to enter it.

I am using kali linux, metasploit to see how I can get into the account computer to get the information that I want.
I have also use Nessus to scan the target 172.19.19.2 and export the result in nessus format. Then use msfconsole to import the nessus file and display the vulnerabilities: see the vuln capture screen 01 and vuln capture screen 02.

I have looked through but fail to find any exploits to gain into the 172.19.19.2 host especially RDP vulnerabilites.

Can anymore advice on this?  I need advice to do the following:

1) Get into the Account computer and get a file
2) Find the password for user name Arnold - confirm there is a user name Arnold.

Please advice

Pages: [1]


Want to be here? Contact Ande, Factionwars or Kulverstukas on the forum or at IRC.