Walkthrough for DerpNStink - A Vulnerable Machine from Vulnhub - [Part 2]

in cybersecurity •  6 years ago 

In the previous demonstration, the first part of this walkthrough for DerpNStink vulnerable machine, we've managed to get inside the server by exploiting different services. Now, in this part, our purpose is to escalate our privileges.

So, we're going to go from a low-privileged user to root, by taking advantage of misconfigured services and leaking credentials.

What I enjoyed most about privilege escalation for DerpNStink was the fact that I needed to analyze a packet capture dump (pcap file) with wireshark to get ssh credentials for another user. I hope you enjoy this demonstration and I hope it helps you better secure the systems you manage.


To stay in touch with me, follow @cristi


Cristi Vlad Self-Experimenter and Author

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  

Thank you provide this tutorial , I am Your 88th Viewers now 4th Likers.