michael
Validating the decoded password of the michael
user
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/snookums]
└─$ ssh michael@$IP
The authenticity of host '192.168.132.58 (192.168.132.58)' can't be established.
ED25519 key fingerprint is SHA256:rouy0/8CKEfhPY0eheyBSXy00UrbHzUFfNIMlNdCNfI.
This key is not known by any other names.
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
Warning: Permanently added '192.168.132.58' (ED25519) to the list of known hosts.
michael@192.168.132.58's password:
[michael@snookums ~]$ whoami
michael
[michael@snookums ~]$ hostname
snookums
[michael@snookums ~]$ ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
3: ens192: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000
link/ether 00:50:56:9e:ba:d9 brd ff:ff:ff:ff:ff:ff
inet 192.168.132.58/24 brd 192.168.132.255 scope global ens192
valid_lft forever preferred_lft forever
Credential reuse confirmed
Lateral Movement made to the michael
user via SSH