What was the command we used to access smb/samba


Problem 1: How did enum4linux find usernames on Victim #2? What protocol(s) and ports did it use?

Problem 2: What does -i do when we used it with ssh?

Problem 3: Why did the recent ssh on kali Linux object to using id_rsa? and why ssh on the victim did not?

Problem 4: What was the command we used to access SMB/SAMBA?

Problem 5: What was the NSE scripts used by nmap -A command to enumerate SMB?

Problem 6: What prevented us from using c language exploits form exploit-db to escalate privileges? Suggest at least one option to be able to run such exploits on victim #2?

Problem 7: What was the main misconfiguration in victim #2 that allowed us to use id_rsa to exploit privileges?

Problem 8: What did ssh2john do to id_rsa?

Problem 9: John the ripper stores the passwords previously cracked, what is the john command to display previously cracked password on id_rsa (Breakable)?

Problem 10: Provide to different commands to copy id_rsa from victim #2 to Kali?

Request for Solution File

Ask an Expert for Answer!!
Programming Languages: What was the command we used to access smb/samba
Reference No:- TGS03247057

Expected delivery within 24 Hours