Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Access Setup Complete the following steps: Open up a new tab on your web lab Begin an SSH session into the target machine by doing
Access Setup
Complete the following steps:
Open up a new tab on your web lab
Begin an SSH session into the target machine by doing the following:
Open a terminal on the attacker machine and run: ssh sysadmin@p
This command will attempt to start an SSH session on your target machine.
Enter the password passwrd when prompted.
After you've successfully logged into the sysadmin account on the target machine, you'll notice your prompt changes to sysadmin:~ $
Swap to the root user by entering sudo s and reentering the password passwrd
You should now have the root prompt root:~ $ that you acquired during your scavenger hunt activity.
Instructions
Fill out the Module Challenge Submission FileLinks to an external site. as you complete this assignment remember to make a copy of this document before filling it out You will submit this document as your deliverable for the Challenge.
Your goal for this assignment is to maintain access to the target machine by installing a backdoor. You will then use the backdoor to crack sensitive passwords.
Complete this assignment by following the steps outlined below. Again, some of these steps will require you to research new tools and concepts. Any information you might need can be found using man pages and online searches. Remember: learning new tools on the job is a key skill for IT and security roles.
Step : Shadow People
In this step, you'll create a "secret" user named sysd Anyone examining etcpasswd will assume that this is a service account, but in fact, you'll be using it to reconnect to the target machine for further exploitation.
Create a sysd user.
Give your user a password make sure you remember it
Give your user a system UID any UID below
Give your user a GID equal to this UID.
Give your user full sudo access without a password.
Minimize exposure by ensuring that your secret user does not have a home folder.
Test that your sysd user can execute commands with sudo access without a password before moving on
Try running sudo l to test. If the terminal does not prompt you for a password, it was a success. Attempt any other commands that require elevated privileges and mark them in your Submission File.
NOTE
If a hacker can rapidly execute commands on a machine with elevated privileges, they can more quickly exfiltrate important data from the target machine.
Step : Smooth Sailing
In this step, you'll allow SSH access via port SSH usually runs on port but opening port will allow you to log in as your secret sysd user without connecting to the standard and wellguarded port
Use Nano to update the etcsshsshdconfig configuration file to allow SSH access via port :
When you open the configuration file, add a secondary SSH port line under port
This will require some research. Start by examining etcsshsshdconfig and using online searches or man pages to learn more about the available configuration options.
Step : Testing Your Configuration Update
When you think you've configured things properly, test your solution by testing the new backdoor SSH port. Do the following steps on the target machine:
First, note that the IP address of the target machine is You'll need this for when you attempt to log back into the target machine.
Make sure to restart the SSH service.
Exit the root account, and log off of the target machine youll know you're back in your attacker machine when the prompt turns green
Use your attacking machine to test the new backdoor SSH port:
SSH back into the target machine as your sysd user, but this time change the port from to using: ssh sysd@p
Once you are connected to the target machine over SSH use sudo su to switch back to the root user.
NOTE
This is an important step. You were able to log out of your root account, and then reestablish a remote session with escalated privileges through a different, unguarded port.
Company servers that house sensitive information will often use monitoring and hardening tools to closely watch key ports, such as for SSH
It is also quite difficult for hackers, on their first breached connection, to know the locations of the most sensitive files in a system.
For this reason, hackers must both attempt to mask their activity as you are doing with your sysd user and also ensure that they can discreetly revisit a system. This allows them to maximize the amount of data they can take from the target machine.
Step : Crack All the Passwords
Next, to strengthen our control of this system, we will attempt to crack as many passwords as we can.
Having access to all the accounts will also allow us to access the system if our other backdoors are closed.
Make sure that you have SSHed into the target machine using your sysd account.
Escalate your privileges to the root user.
Use John to crack the
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started