Did you find what files work? Please dm me if you can
Did you find the file that works?
1: Nmap Scan 22, 21
are open
2: Brute force attack using Hydra or Crackmapexec //Note 21 ‘FTP’ is faster than SSH
3: Download password.list and username.list wget https://academy.hackthebox.com/storage/resources/Password-Attacks.zip
4: In Brute force attack use the password.list and username.list //You can downloads them from resources ex: hydra -L username.list -P password.list ftp://IP
//Just be patient
5: Connect through FTP and download id_rsa // ftp IP
, then enter the password
6: Connect through SSH ssh USER@IP -i id_rsa
, then enter the password
7: Find the ROOT password, hint: check the history
try to lower number of tasks by removing -t64 or setting lower number
just use the files provided in module resources
Lab Easy it’s OK!
However I couldn’t find the correct credentials using username.list and password.list. I’ve used hydra and crackmap whith out results.
I can resolve the module only reading this forum where they mention user M***.
Maybe should update this Lab
kira has a husband that she met in the library i think while they were studying about licensing products he must have felt so lucky, like he was in the casino or something
Text me for any questions
Same