Nr. 2 Hadoop +(10.2.2.2) |
+(Vulnerable) | +
---|---|
OS: | +Ubuntu 16.04.05 x64 | +
Software: | +JDK, + |
+
Default server’s port: | +8020 | +
Server’s config: | +Single node cluster | +
Scan results: | +Machine exploited using Hadoop exploiter | +
Notes: | ++ |
Nr. 3 Hadoop +(10.2.2.3) |
+(Vulnerable) | +
---|---|
OS: | +Windows 10 x64 | +
Software: | +JDK, + |
+
Default server’s port: | +8020 | +
Server’s config: | +Single node cluster | +
Scan results: | +Machine exploited using Hadoop exploiter | +
Notes: | ++ |
Nr. 4 Elastic +(10.2.2.4) |
+(Vulnerable) | +
---|---|
OS: | +Ubuntu 16.04.05 x64 | +
Software: | +JDK, + |
+
Default server’s port: | +9200 | +
Server’s config: | +Default | +
Scan results: | +Machine exploited using Elastic exploiter | +
Notes: | +Quick tutorial on how to add entries (was useful when setting up). | +
+ | + |
Nr. 5 Elastic +(10.2.2.5) |
+(Vulnerable) | +
---|---|
OS: | +Windows 10 x64 | +
Software: | +JDK, + |
+
Default server’s port: | +9200 | +
Server’s config: | +Default | +
Scan results: | +Machine exploited using Elastic exploiter | +
Notes: | +Quick tutorial on how to add entries (was useful when setting up). | +
Nr. 6 Sambacry +(10.2.2.6) |
+(Not implemented) | +
---|---|
OS: | +Ubuntu 16.04.05 x64 | +
Software: | +Samba > 3.5.0 and < 4.6.4, 4.5.10 and 4.4.14 | +
Default server’s port: | +- | +
Root password: | +;^TK`9XN_x^ | +
Server’s config: | ++ |
Scan results: | +Machine exploited using Sambacry exploiter | +
Notes: | ++ |
+ | + |
Nr. 7 Sambacry +(10.2.2.7) |
+(Not implemented) | +
---|---|
OS: | +Ubuntu 16.04.05 x32 | +
Software: | +Samba > 3.5.0 and < 4.6.4, 4.5.10 and 4.4.14 | +
Default server’s port: | +- | +
Root password: | +*.&A7/W}Rc$ | +
Server’s config: | ++ |
Scan results: | +Machine exploited using Sambacry exploiter | +
Notes: | ++ |
Nr. 8 Shellshock +(10.2.2.8) |
+(Vulnerable) | +
---|---|
OS: | +Ubuntu 12.04 LTS x64 | +
Software: | +Apache2, bash 4.2. | +
Default server’s port: | +80 | +
Scan results: | +Machine exploited using Shellshock exploiter | +
Notes: | +Vulnerable app is under /cgi-bin/test.cgi | +
+ | + |
Nr. 9 Tunneling M1 +(10.2.2.9, 10.2.1.9) |
+(Vulnerable) | +
---|---|
OS: | +Ubuntu 16.04.05 x64 | +
Software: | +OpenSSL | +
Default service’s port: | +22 | +
Root password: | +`))jU7L(w} | +
Server’s config: | +Default | +
Notes: | ++ |
Nr. 10 Tunneling M2 +(10.2.1.10) |
+(Exploitable) | +
---|---|
OS: | +Ubuntu 16.04.05 x64 | +
Software: | +OpenSSL | +
Default service’s port: | +22 | +
Root password: | +3Q=(Ge(+&w]* | +
Server’s config: | +Default | +
Notes: | +Accessible only trough Nr.9 | +
Nr. 11 SSH key steal. +(10.2.2.11) |
+(Vulnerable) | +
---|---|
OS: | +Ubuntu 16.04.05 x64 | +
Software: | +OpenSSL | +
Default connection port: | +22 | +
Root password: | +^NgDvY59~8 | +
Server’s config: | +SSH keys to connect to NR. 11 | +
Notes: | ++ |
+ | + |
Nr. 12 SSH key steal. +(10.2.2.12) |
+(Exploitable) | +
---|---|
OS: | +Ubuntu 16.04.05 x64 | +
Software: | +OpenSSL | +
Default connection port: | +22 | +
Root password: | +u?Sj5@6(-C | +
Server’s config: | +SSH configured to allow connection from NR.10 | +
Notes: | +Don’t add this machine’s credentials to exploit configuration. | +
+ | + |
Nr. 13 RDP grinder +(10.2.2.13) |
+(Not implemented) | +
---|---|
OS: | +Windows 10 x64 | +
Software: | +- | +
Default connection port: | +3389 | +
Root password: | +2}p}aR]&=M | +
Scan results: | +Machine exploited using RDP grinder | +
Server’s config: | +Remote desktop enabled +Admin user’s credentials: +m0nk3y, 2}p}aR]&=M |
+
Notes: | ++ |
+ | + |
Nr. 14 Mimikatz +(10.2.2.14) |
+(Vulnerable) | +
---|---|
OS: | +Windows 10 x64 | +
Software: | +- | +
Admin password: | +Ivrrw5zEzs | +
Server’s config: | +Has cashed mimikatz-15 RDP credentials +SMB turned on |
+
Notes: | ++ |
Nr. 15 Mimikatz +(10.2.2.15) |
+(Exploitable) | +
---|---|
OS: | +Windows 10 x64 | +
Software: | +- | +
Admin password: | +pAJfG56JX>< | +
Server’s config: | +It’s credentials are cashed at mimikatz-14 +SMB turned on |
+
Notes: | +If you change this machine’s IP it won’t get exploited. | +
+ | + |
Nr. 16 MsSQL +(10.2.2.16) |
+(Vulnerable) | +
---|---|
OS: | +Windows 10 x64 | +
Software: | +MSSQL Server | +
Default service port: | +1433 | +
Server’s config: | +xp_cmdshell feature enabled in MSSQL server +Server’s creds (sa): admin, }8Ys#" |
+
Notes: | +Enabled SQL server browser service + + |
+
+ | + |
Nr. 17 Upgrader +(10.2.2.17) |
+(Not implemented) | +
---|---|
OS: | +Windows 10 x64 | +
Default service port: | +445 | +
Root password: | +U??7ppG_ | +
Server’s config: | +Turn on SMB | +
Notes: | ++ |
+ | + |
Nr. 18 WebLogic +(10.2.2.18) |
+(Vulnerable) | +
---|---|
OS: | +Ubuntu 16.04.05 x64 | +
Software: | +JDK, + |
+
Default server’s port: | +7001 | +
Admin domain credentials: | +weblogic : B74Ot0c4 | +
Server’s config: | +Default | +
Notes: | ++ |
Nr. 19 WebLogic +(10.2.2.19) |
+(Vulnerable) | +
---|---|
OS: | +Windows 10 x64 | +
Software: | +JDK, + |
+
Default server’s port: | +7001 | +
Admin servers credentials: | +weblogic : =ThS2d=m(`B | +
Server’s config: | +Default | +
Notes: | ++ |
Nr. 20 SMB +(10.2.2.20) |
+(Vulnerable) | +
---|---|
OS: | +Windows 10 x64 | +
Software: | +- | +
Default service’s port: | +445 | +
Root password: | +YbS,<tpS.2av | +
Server’s config: | +SMB turned on | +
Notes: | ++ |
Nr. 21 Scan +(10.2.2.21) |
+(Secure) | +
---|---|
OS: | +Ubuntu 16.04.05 x64 | +
Software: | +Apache tomcat 7.0.92 | +
Default server’s port: | +8080 | +
Server’s config: | +Default | +
Notes: | +Used to scan a machine that has no vulnerabilities (to evaluate scanning speed for e.g.) | +
+ | + |
Nr. 22 Scan +(10.2.2.22) |
+(Secure) | +
---|---|
OS: | +Windows 10 x64 | +
Software: | +Apache tomcat 7.0.92 | +
Default server’s port: | +8080 | +
Server’s config: | +Default | +
Notes: | +Used to scan a machine that has no vulnerabilities (to evaluate scanning speed for e.g.) | +
+ | + |
Nr. 23 Struts2 +(10.2.2.23) |
+(Vulnerable) | +
---|---|
OS: | +Ubuntu 16.04.05 x64 | +
Software: | +JDK, +struts2 2.3.15.1, +tomcat 9.0.0.M9 |
+
Default server’s port: | +8080 | +
Server’s config: | +Default | +
Notes: | ++ |
Nr. 24 Struts2 +(10.2.2.24) |
+(Vulnerable) | +
---|---|
OS: | +Windows 10 x64 | +
Software: | +JDK, +struts2 2.3.15.1, +tomcat 9.0.0.M9 |
+
Default server’s port: | +8080 | +
Server’s config: | +Default | +
Notes: | ++ |
+ | + |
Nr. 250 MonkeyIsland +(10.2.2.250) |
++ |
---|---|
OS: | +Ubuntu 16.04.05 x64 | +
Software: | +MonkeyIsland server, git, mongodb etc. | +
Default server’s port: | +22, 443 | +
Private key passphrase: | +- | +
Notes: | +Only accessible trough GCP | +
+ | + |
Nr. 251 MonkeyIsland +(10.2.2.251) |
++ |
---|---|
OS: | +Windows Server 2016 x64 | +
Software: | +MonkeyIsland server, git, mongodb etc. | +
Default server’s port: | +3389, 443 | +
Private key passphrase: | +- | +
Notes: | +Only accessible trough GCP | +
+ | + |