1/31/2024 0 Comments Download sumo 50 ecWe’ll use a scan called Ping Sweep which will use ICMP ECHO packet to discover online hosts, without conducting further port scanning on each of the discovered host. We first need to discover the machine’s IP. Your IP might be different and the network interface might be called wlan0 for example. In this example, the machine’s IP is 10.0.0.4 - as you can see under eth0 section, which is my network interface. Inet6 fe80::9d63:5edd:cbec:c46a/64 scope link noprefixroute Inet 10.0.0.4/24 brd 10.0.0.255 scope global dynamic noprefixroute eth0 We’ll use mkdir and cd (change directory) into it:ġ: lo: mtu 65536 qdisc noqueue state UNKNOWN group We need to create a dedicated directory in our home directory ~ for our findings. Parrot Security VM (based on Arch distribution with different desktop flavors) can be downloadedĭownload the virtual machine from Vulnhub, start it and give it a couple of minutes to boot.Kali Linux VM (based on Debian distribution) can be downloaded for both VMware and VirtualBox.These Linux distribution has all required tools pre-installed. ![]() ![]() The virtual machine we’ll use to source the attack vectors against the Sumo 1 virtual machine. Prerequisites Kali Linux / Parrot Security OS Goal: Get the root shell and then obtain flag under /root). It is rated as Easy/Beginner level machine. In this post, we’ll try to root “Sumo: 1”, a vulnerable-by-design virtual machine from Vulnhub. We’ll try to get root shell and obtain flag. “Sumo: 1”, a vulnerable-by-design virtual machine from Vulnhub, rated as Easy/Beginner level machine.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |