boot2root: VulnOS

A little bit dated now, but I hadn't actually run through this one so I thought I'd document it as I did! As usual, starting with a: netdiscover -i eth0 We discover that the machine is running on 192.168.56.103. Next we run an nmap scan: root@kali:~# nmap -sS -T4 -A 192.168.56.103 -p 1-65535 The name "VulnOS" is certainly not a lie! root@kali:~# nmap -sS -T4 -A 192.168.56.103 -p 1-65535 Starting Nmap 7.00 ( https://nmap.org ) at 2015-11-24 18:41 GMT Nmap scan report for 192.168.56.103 Host is up (0.00017s latency). Not shown: 65507 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 5.3p1 Debian 3ubuntu7 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 1024 43:a6:84:8d:be:1a:ee:fb:ed:c3:23:53:14:14:8f:50 (DSA) |_ 2048 30:1d:2d:c4:9e:66:d8:bd:70:7c:48:84:fb:b9:7b:09 (RSA) 23/tcp open telnet Linux telnetd 25/tcp open smtp Postfix smtpd |_smtp-commands: VulnOS.home, PIPELINING, SIZE 10240000, VRFY, ETRN, ...