questions
questions
Exploit the vulnerable Linux machine using the VSFTPD exploit; find the post-
module that upgrades the shell to meterpreter.
2. Upgrade the shell to meterpreter and run the 'sysinfo' command; find the
received OS output.
3. List the running processes on the vulnerable Linux machine via meterpreter;
find the user running the process distccd.
4. Execute on the vulnerable Linux machine the 'getuid' command and find the
displayed output.
5. Use the meterpreter to search inside the vulnerable Linux machine; find the
path of the file accounts.txt.
6. Find when the file 'accounts.txt' was last modified (HH:MM:SS DDMMYYYY).
7. Download the file 'accounts.txt' and find the file's MD5 hash.
8. Use the meterpreter command 'shell' to get a system shell; find the number of
directories inside /home/msfadmin/vulnerable.
9. Access the vulnerable Linux machine shadow file and crack the password of the
user 'sys'.
10. Download the file uploadme.x and upload it to the /tmp directory on the
vulnerable Linux machine; what command did you use to upload?
11. Execute the file uploadme.x on the vulnerable Linux machine and find the file
name created.
12. Check the meterpreter help menu and find the command to view the current
process identifier.
13. Check the 'ps' help menu and find the flag to display child processes of the
current shell.
14. Find the path of the file responsible for the current session.
15. Check the 'execute' help menu and find the flag to execute commands on the
vulnerable Linux machine.
16. Exploit the vulnerable Linux machine using the msfconsole module
usermap_script; find the current user.
17. Check the 'session' help menu and find the flag to upgrade the shell into
meterpreter.
18. Check the 'session' help menu and find the flag to run commands on active
sessions.
19. Execute the 'ifconfig' on the active session; find the displayed output.