Skip to main content

Posts

Bypass Kali Linux Login Screen

This is the another post of the Operating System Login Mechanism bypass series. In this post, we are going to bypass the login screen of the Kali Linux that works on all Kali rollings. This is method is slightly different from the method of the Ubuntu. STEPS:- Step 1 :  First, boot the Kali rolling and you will find the GRUB Menu of the KALI. Step 2 :  Then press 'e'  key to load the GRUB. Step 3 :  After that, replace 'ro'  to 'rw'  and 'init=/bin/bash'  at the same line and press 'F10'  key to load with this GRUB file. Step 4 :  After the boot, you will dropped into the root shell of the system. Step 5 :  Now, type 'passwd root'  command and enter the new unix password twice of the root user. Now, Reboot the system and boot normally and you are able to login to the root account of the Kali-rolling with the new password. Post written by - M4TRIX_H4CK3R Author  -  https://en.gravatar.com/kalima
Recent posts

Bypass Ubuntu Login Screen

Here is the new post on the series of the bypassing of the login screens of the different Operating Systems . In this post, we are going to bypass login screen of the 'Ubuntu 16.04 LTS' . This method is basically works on all Ubuntu . Here is the screen of the Login of the Ubuntu 16.04 LTS which we are going to bypass. STEPS:- Steps 1 :  First restart the system and load the GRUB menu by holding SHIFT  key when the BIOS  loads. After that selects ' Advanced Options ' and you will get this menu. Steps 2 :  Then selects recovery mode on the above menu and you will get the following menu. Steps 3 :  Then selects the root menu and you will dropped into root shell of the system. Steps 4 :  Then run the following commands: mount -rw -o remount / passwd <username> After the successful completion of the command, you have successfully changed the root password of the system. You find the root username of the system by changing to the syst

Unlock Windows XP Login remotely with Administrator

In this article, we are going to talk about to unlock Windows XP remotely for the physical access as the Administrator of the system. ATTACKER'S MACHINE : Kali Linux 18.3 VICTIM'S MACHINE : Windows XP SP3 First of all, scan the victim using nmap and check the vulnerability exist on the target. On the successful scan of the target, we got that the target is vulnerable to smb vulnerability 'MS08_067_NETAPI'. Then we run metasploit and load the explit. On the successful exploitation of the target, we got the meterpreter session in return with the Administrator privileges. Now, enter in the system shell and create user with the command : net user <username> /add After the successful completion of the previous command, we need to assign the administrator privileges to the user using the command : net localgroup administrators <username> /add This command will assign the administrator privileges to the user and now, you

CTF - SQLi TO SHELL Challenge Walkthrough

Now, SQLi to SHELL is one of the VM machine challenge to get shell of the server using SQLi. PENETRATION METHODOLOGY: NMAP SQLMAP METASPLOIT EXPLOITATION First of all, we need to enumerate the services and ports running on the server for the information gathering purpose of the target. As the result shows that the target is running ssh and http  services. Now check the HTTP for further information gathering. On visiting HTTP, it running a photoblog. On further enumeration, we get that the server is vulnerable to SQLi vulnerability. As we are able to run sqlmap on the server and try to find out the user details. On running sqlmap, we get the admin user and password. Trying to login with this credentials and we are successful to enter in the admin panel. Now try to upload our malicious php script and get a reverse tcp shell. We create the malicious payload using msfvenom with file extension as ' php3 ' because the server does

CTF - Billu_B0x Challenge Walkthrough

This is another VM named as Billu_B0x. This is very easy to access and can get root access of the machine. PENETRATION METHODOLOGY: NMAP DIRB CURL SSH EXPLOITATION First of all we need to run nmap to enumerate ports and services running on the server. On enumerating target, we get ssh and http are running. On viewing HTTP over browser, we get the following page running. Now trying to run ' dirb ' on the web server using the big.txt dictionary. On the scan we found phpmy page, we find phpmyadmin is running. After that viewing the dirb scan, their is '/test', by visiting the directory we found that page. This page shows that their is post parameter named 'file'. Now we are trying to curl this page using tool ' curl ' to read the remote files by using LFI vulnerability. First, we are trying to read the passwd file on the remote location. And we are success to read the file. Now we are trying the configu

CTF - MrRobot Challenge Walkthrough

This is the another boot2root challenge based on the TV show mrRobot. This VM has three flags/keys on different locations and to find them all, exploit the machine remotely and get into root shell. PENETRATION METHODOLOGY: NMAP WPSCAN DIRB WGET METASPLOIT-FRAMEWORK NMAP INTERACTIVE MODE On service enumeration of the VM, we get multiple ports and services running. As this result shows that HTTP service is running is running and on visiting the IP over http we get following page On checking the robots.txt file, we get this page with two entries. As viewing the entries, one of the file is first key and another file is dictionary for passwords. Downloading both files. As now we run the ' dirb ' to find directories on the web. On the dirb result we found that the server is running wordpress. So we know that the Elliot is the main person of the show, so let's try his name for the wordpress login. Now try to crack this pass