📓
Pentesting
  • Writeups
  • HackTheBox
    • Easy Machines
      • Beep Writeup
      • Shocker Writeup
      • Lame Writeup
      • Jerry Writeup
      • Legacy Writeup
      • Blue Writeup
  • TryHackMe
    • Walkthroughs: Easy
      • CC: Steganography
      • Cryptography for Dummies
      • Cross-site Scripting
      • SQL Injection Lab
      • SQL Injection
      • ZTH: Web 2
      • SSRF
      • XXE
      • Authenticate
      • Injection
      • Blaster
      • The Cod Caper
      • Hardening Basics Part 1
      • What the Shell?
      • Game Zone
      • Upload Vulnerabilities
      • Bolt
      • Erit Securus 1
      • CC: Pentesting
      • JavaScript Basics
      • OverPass 2 - Hacked
      • Linux: Local Enumeration
      • Ice
      • Linux Backdoors
      • Avengers Blog
      • DNS in Detail
      • Putting it all together
      • Kenobi
      • Common Linux Privesc
      • Network Services 2
      • Network Services
      • The Hacker Methodology
      • The Find command
      • HTTP in Detail
      • Web Fundamentals
      • How Websites Work
      • Introductory Networking
    • Challenges (CTF): Easy
      • VulNet: Roasted
      • VulNet: Internal
      • Git Happens
      • Kiba
      • VulNet: Node
      • Memory Forensics
      • Smag Grotto
      • Investigating Windows
      • Cat Pictures
      • Juicy Details
      • Anthem
      • Tony The Tiger
      • Jack-of-All-Trades
      • JPGChat
      • Blueprint
      • All in One
      • Gotta Catch'em All
      • Mustacchio
      • Break Out The Cage
      • HeartBleed
      • Poster
      • Madness
      • Source
      • Thompson
      • Library
      • Magician
      • Anonforce
      • Dav
      • GLITCH
      • Fowsniff CTF
      • Team
      • H4cked
      • Easy Peasy
      • ColddBox: Easy
      • Archangel
      • Cyborg
      • Chocolate Factory
      • Brute It
      • Year of the Rabbit
      • ChillHack
      • Gaming Server
      • Brooklyn Nine Nine
      • Wgel CTF
      • Tomghost
      • ToolsRus
      • Skynet
      • Startup
      • Agent Sudo
      • Lian-Yu
      • OhSINT
      • Overpass
      • Crack The Hash
      • Ignite
      • Inclusion
      • Bounty Hunter
      • LazyAdmin
      • RootMe
      • Pickle Rick
      • Basic Pentesting
      • Simple CTF
  • Crackmes.one
    • 1 Difficulty Rating
      • easyAF
      • Easy Keyg3nme
Powered by GitBook
On this page
  • NFS: Network File System
  • Understanding NFS
  • Enumerating NFS
  • Exploiting NFS
  • SMTP: Simple Mail Transfer Protocol
  • Understanding SMTP
  • Enumerating SMTP
  • Exploiting SMTP
  • MySQL: Structured Query Language
  • Understanding MySQL
  • Enumerating MySQL
  • Exploiting MySQL

Was this helpful?

  1. TryHackMe
  2. Walkthroughs: Easy

Network Services 2

PreviousCommon Linux PrivescNextNetwork Services

Last updated 3 years ago

Was this helpful?

NFS: Network File System

Understanding NFS

Enumerating NFS

Lets run nmap scans to get information on the machine

Lets mount the file

Exploiting NFS

Lets follow these steps

Now login through ssh and run the command "bash -p" in the home directory

We are root

Lets read the flag

SMTP: Simple Mail Transfer Protocol

Understanding SMTP

Enumerating SMTP

Lets run nmap scans to get information about the open ports on the machine

Lets start Metasploit and look for the module they mentioned and then set the options

Lets search for what MTA is running the SMTP server

This can also be seen in the output after we ran the enumeration module

Lets do the next steps

Lets run the exploit

Exploiting SMTP

Lets use hydra to crack the password

Lets login through ssh and read the flag

MySQL: Structured Query Language

Understanding MySQL

Enumerating MySQL

Lets run a nmap port scan

Lets login into MySQL as root

Lets launch Metasploit and search for the module and look at what options we have to set

Lets set the options

Now lets run the module

Lets set the SQL parameter to show databases and run the exploit

Exploiting MySQL

Lets follow the steps they have given

Lets do the next step

Lets save the username and hash into a file called hash.txt

Now lets crack it with John The Ripper

Lets now login through ssh and get the flag

The last table returned