eJPT Junior Penetration Tester
ShopAuthorPatreonHTB Pro Labs
eJPT Junior Penetration Tester
eJPT Junior Penetration Tester
  • 🍕eJPT Study Notes
  • Author
  • eCPPTv2 Study Notes
  • INE eJPT Exam
    • Description
    • eJPT Certification
  • RFS Tips
    • Before the Exam
    • Prepare your Setup
    • Questions?
    • Start Hacking
  • Methodology
    • 1️⃣To Scan a Network
    • 2️⃣To Attack a Linux Machine
    • 3️⃣To Attack a Windows Machine
    • 4️⃣Pivoting Methodology
    • 5️⃣Linux Post Exploitation
    • 6️⃣Windows Post Exploitation
  • Community
    • LinkedIn
    • Discord
  • Networking
    • 🟢OSI Layers
    • 🟢Protocols
    • 🟢Subnetting
    • 🟢Routing
    • Pivoting
  • Network Protocols
    • 🟢FTP 21
    • 🟢SSH 22
    • ✅HTTP 80
    • 🟢NetBIOS 139
    • 🟠SMB 445
    • MySQL 3306
    • 🟢RDP 3389
  • Web Attacks
    • XSS
    • SQLi
    • Path Traversal
    • Command Injection
    • LFI - Local File Inclusion
    • LFI cheatsheet - HTB
  • Web CMS Attacks
    • Wordpress
    • Joomla
    • TomCat
  • Exploits
    • Search Exploits
    • Linux
    • Windows
  • Tools
    • dirb
    • 🟢Gobuster
    • Nmap
    • Netcat
    • Burpsuite
    • 🟢SQLMap
    • 🟢Metasploit
    • Hydra
    • 🟢John the Ripper
    • Hashcat
  • Web Tools
    • 😍RevShells
    • MD5 Crack
    • CyberChef
    • SecLists
  • TryHackMe Rooms
    • DogCat
    • Archangel
    • OWASP Juice Shop
  • Hack The Box Rooms
    • Page 2
  • Create Your Own Lab
    • Page 3
  • Other Resources
    • Page 1
  • TCM Security Courses
    • Page 4
Powered by GitBook
On this page
  • Juice Information
  • SSH Service
  • FTP Service
  • Samba Service
  • Web Servers
  • What do we want?

Was this helpful?

  1. Methodology

To Attack a Linux Machine

Explore our comprehensive article, focusing on the 'Methodology To Attack a Linux Machine'. Delve into detailed strategies, potential vulnerabilities, and effective prevention tips. Secure your system

PreviousTo Scan a NetworkNextTo Attack a Windows Machine

Last updated 1 year ago

Was this helpful?

Ok after scanning the network we detect some Linux machines and now?

What do we need to investigate in order to get root on the remote machine?

First scan all 65535 TCP ports available, don't scan them all at once. Start by scanning the most common ones then go increasing the port ranges.

Do the same for all 65535 UDP ports.

After scanning all ports we hope to find some services running on them, grab all banners from remote services, and investigate them.

The objective is to find services that can allow us to connect to the machine without authentication or send files to the machine, or a web server since it gives us a lot more to investigate in order to find an entry point.

If we don't find anything useful running on the host it's time to run different scans against the host. Remember don't be noisy, prepare yourself for the next exams.

Juice Information

  1. Linux Kernel version

  2. The version of the Services running

  3. Sometimes we can detect users remotely

SSH Service

SSH is hard to exploit but can be brute forced, if you find a valid user try to brute force ssh.

Read more about

FTP Service

Old FTP can be an entry point into the remote system, maybe an anonymous user is allowed and we can get some files or better send files to the server.

Search for files inside the available folders in case you found a Web server folder send a PHP reverse shell.

Pay attention to hidden folders and the folder's names and paths as well.

Samba Service

Web Servers

Remember! Users from web applications are different from system users.

Read More about hacking Web Servers here:

Read More about hacking Web Applications here:

What do we want?

A stable highly privileged shell of course. Root access!

Transfer files to the machine.

Download files from the machine.

Pivoting into other networks.

FTP is nice to be brute-forced if you have a valid user. If you want to learn more about read my full article about it!

SMB is the most common entry point it has tons of CVEs and most of the time is poorly configured, Check my article about and learn how o breach it!

2️⃣
SSH Penetration Testing
FTP Penetration Testing
SMB Penetration testing
Welcome!Hacking Web Servers
Hacking Web Servers
Welcome!Hacking Web Applications
Hacking Web Applications
Logo
Logo