SSH
Validating the web credential of the wp_hub
user; qazwsxedc
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/wallpaperhub]
└─$ sshpass -p qazwsxedc ssh wp_hub@$IP
Welcome to Ubuntu 24.04.1 LTS (GNU/Linux 6.8.0-48-generic x86_64)
* Documentation: https://help.ubuntu.com
* Management: https://landscape.canonical.com
* Support: https://ubuntu.com/pro
System information as of Tue Apr 15 01:13:28 PM UTC 2025
System load: 0.0 Processes: 159
Usage of /: 53.9% of 9.75GB Users logged in: 0
Memory usage: 14% IPv4 address for ens192: 192.168.106.204
Swap usage: 0%
* Strictly confined Kubernetes makes edge and IoT secure. Learn how MicroK8s
just raised the bar for easy, resilient and secure K8s cluster deployment.
https://ubuntu.com/engage/secure-kubernetes-at-the-edge
Expanded Security Maintenance for Applications is not enabled.
185 updates can be applied immediately.
33 of these updates are standard security updates.
To see these additional updates run: apt list --upgradable
Enable ESM Apps to receive additional future security updates.
See https://ubuntu.com/esm or run: sudo pro status
The list of available updates is more than a week old.
To check for new updates run: sudo apt update
Failed to connect to https://changelogs.ubuntu.com/meta-release-lts. Check your Internet connection or proxy settings
Last login: Tue Apr 15 13:09:51 2025 from 192.168.45.217
wp_hub@wallpaperhub:~$ whoami
wp_hub
wp_hub@wallpaperhub:~$ hostname
wallpaperhub
wp_hub@wallpaperhub:~$ ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
3: ens192: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
link/ether 00:50:56:9e:bb:d8 brd ff:ff:ff:ff:ff:ff
altname enp11s0
inet 192.168.106.204/24 brd 192.168.106.255 scope global ens192
valid_lft forever preferred_lft forever
Credential reuse confirmed.
Initial Foothold established to the target system as the wp_hub
user via SSH