From the course: Kali Linux for Advanced Pen Testing and Ethical Hacking
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Time to exploit Cronos - Linux Tutorial
From the course: Kali Linux for Advanced Pen Testing and Ethical Hacking
Time to exploit Cronos
- [Instructor] The final Hack The Box target we'll look at is 10.10.10.13, otherwise known as Cronos. This is an example of a more complex target in which deeper enumeration and spending time researching the target applications is the key to getting access. Once again, the first thing we'll do is run nmap to find out what we're targeting and we'll use the minus A switch to get the full details of the services nmap -A -PS -A 10.10.10.13. We have a Linux host with ports 22, 53 and 80 open. There's not much more obvious information here. Let's do a quick check of what we can see on the web server, 10.10.10.13. We have the default Apache page. There's nothing to see here. We might start running Gobuster to see if we can find any hidden pages but before we do that, let's reflect on what we've found already. We have a website which has port 53 open, and this may indicate there's more than just one website being served up.…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.