Post Exploitation
Since this is the freeBSD OS, LinEnum won't work, we will have to do this manually :(
Last updated
Was this helpful?
Since this is the freeBSD OS, LinEnum won't work, we will have to do this manually :(
Last updated
Was this helpful?
Copy the secret.zip to your current directory form charix.
The file required a password, using the password we found earlier, we can extract the file. We'll leave this for now
This shows us that there is a vnc process running as root
Viewing the entire process
rfbport is the port which vnc is listening on, which in this case is 5901.
We can verify with netstat
The above command allocates a socket to listen to port 5000 on localhost from my attack machine (kali). Whenever a connection is made to port 5000, the connection is forwarded over a secure channel and is made to port 5901 on localhost on the target machine (poison).
Something cool about VNC is that you can you a password file to authenticate to the vnc server. We found a password file earlier, remember? Let's try that bad boy out.
You can actually decode that password file with the following github repo