Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Step 4 : Crack All the Passwords Next, to strengthen our control of this system, we will attempt to crack as many passwords as we

Step 4: Crack All the Passwords
Next, to strengthen our control of this system, we will attempt to crack as many passwords as we can.
Having access to all the accounts will also allow us to access the system if our other backdoors are closed.
Make sure that you have SSH-ed into the target machine using your sysd account.
Escalate your privileges to the root user.
Use John to crack the entire /etc/shadow file.
You will not need to transfer the file, as John is already installed on the scavenger hunt VM.
NOTE
Cracking passwords is a process that takes time. Now might be a good opportunity to take a break and let the computer do the work for you.
Make a copy of this document to work in, and then for each step, add the solution commands below the prompt. Save and submit this completed file as your Challenge deliverable.
Step 1: Shadow People
Create a secret user named sysd. Make sure this user doesn't have a home folder created.
[Your solution command here]
Give your secret user a password.
[Your solution command here]
Give your secret user a system UID <1000.
[Your solution command here]
Give your secret user the same GID.
[Your solution command here]
Give your secret user full sudo access without the need for a password.
[Your solution command here]
Test that sudo access works without your password.
[Your bash commands here]
Step 2: Smooth Sailing
Edit the sshd_config file.
[Your bash commands here]
Step 3: Testing Your Configuration Update
Restart the SSH service.
[Your solution command here]
Exit the root account.
[Your solution command here]
SSH to the target machine using your sysd account and port 2222.
[Your solution command here]
Use sudo to switch to the root user.
[Your solution command here]
Step 4: Crack All the Passwords
SSH back to the system using your sysd account and port 2222.
[Your solution command here]
Escalate your privileges to the root user. Use John to crack the entire /etc/shadow file.
[Your solution command here]

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions