Post Exploitation
Since this is the freeBSD OS, LinEnum won't work, we will have to do this manually :(
Copy the secret.zip to your current directory form charix.
scp charix@10.10.10.84:/home/charix/secret.zip .The file required a password, using the password we found earlier, we can extract the file. We'll leave this for now
Enumeration of system
ps -auxThis shows us that there is a vnc process running as root

Viewing the entire process
rfbport is the port which vnc is listening on, which in this case is 5901.
We can verify with netstat

The above command allocates a socket to listen to port 5000 on localhost from my attack machine (kali). Whenever a connection is made to port 5000, the connection is forwarded over a secure channel and is made to port 5901 on localhost on the target machine (poison).
Connecting to VNC
Something cool about VNC is that you can you a password file to authenticate to the vnc server. We found a password file earlier, remember? Let's try that bad boy out.

You can actually decode that password file with the following github repo
Last updated