4.8 Target 10


After many attempts, we did not manage to get into target 10. Using nmap, we discovered that it had 3 ports open: 22/tcp, 111/tcp, and 32768/tcp. We could not find any exploits that would compromise these protocols. But one thing we did find was that port 22/tcp, which is ssh, had a really old version, 3.5p1. Also we found “OpenSSH 3.5p1 Remote Root Exploit for FreeBSD” on the exploit database which has the same version of openSSH. However, we were not able to get access by using this exploit, and did not manage to break into target 10

results matching ""

    No results matching ""