Posts

Showing posts from June, 2015

De-Ice 1.20b Walkthrough

Image
                     Well 15 days back I have written Walk-through of De-Ice 1.120a On My Blog . I got great response by vulnhub and they published my walk-through  https://www.vulnhub.com/author/trnform3r,152/ With a such a warm encouragement I feel like writing more walk-through. Here Is my walk-through on De-Ice 1.20b. You can download the VM and get more info about it form here . Note: The attacker machine and the VM should be in the subnet of 192.168.1.0/24 Labsetup:  1 - Open Vmware - > Edit - >"Virtual Network Editor" 2 - Click on "Add Network" and add any 1 Network example VMnet2 3 - Select VMnet2 and change Subnet IP - 192.168.1.0 and Subnet mask - 255.255.255.0 also select "Host - Only" 4 - Now add this adapter VMnet2 for both the machine. When you start the VM it looks something like this.

De-Ice 1.120a Walkthrough

Image
          Few days back my friend Chetan told to get hands on De Ice and Kioptrix series before taking PWK labs.The very next weekend I started with De-Ice http://hackingdojo.com/downloads/iso/De-ICE_S1.120.iso . As my bridge network was on 192.168.1.x series I thought of doing De-Ice 1.120a just by bridging the VM. One of the awesome URL that I found today was https://blog.g0tmi1k.com/2011/03/vulnerable-by-design/ . Enumeration: I started with nmap as usual to find all the open ports. I usually use version detection and aggressive scan in nmap.

Underdist 3 Vulnerable VM Walkthrough

Image
1) Initially I tried nmap to discover the open ports shown below.

Directory traversal cheat sheet

Image
Step 1: Intercept the request where you would like to test directory traversal and file inclusion as shown below: