cassie
Trying again the leaked password; SecondBiteTheApple330
freeswitch@clue:/$ su cassie
Password: SecondBiteTheApple330
cassie@clue:/$ whoami
cassie
cassie@clue:/$ hostname
clue
cassie@clue:/$ ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
3: ens192: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000
link/ether 00:50:56:9e:c3:e4 brd ff:ff:ff:ff:ff:ff
inet 192.168.220.240/24 brd 192.168.220.255 scope global ens192
valid_lft forever preferred_lft forever
It works. It didn’t work against the SSH server.
Lateral Movement made to the cassie
user