SSH
A SSH credential has been identified; charlie
:rU)tJnTw5*ShDt4nOx
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/workaholic]
└─$ sshpass -p 'rU)tJnTw5*ShDt4nOx' ssh charlie@$IP
Welcome to Ubuntu 24.04.2 LTS (GNU/Linux 6.8.0-48-generic x86_64)
* Documentation: https://help.ubuntu.com
* Management: https://landscape.canonical.com
* Support: https://ubuntu.com/pro
System information as of Fri Jun 27 03:19:57 PM UTC 2025
System load: 0.08 Processes: 164
Usage of /: 55.3% of 9.75GB Users logged in: 0
Memory usage: 34% IPv4 address for ens192: 192.168.136.229
Swap usage: 0%
* Strictly confined Kubernetes makes edge and IoT secure. Learn how MicroK8s
just raised the bar for easy, resilient and secure K8s cluster deployment.
https://ubuntu.com/engage/secure-kubernetes-at-the-edge
Expanded Security Maintenance for Applications is not enabled.
17 updates can be applied immediately.
10 of these updates are standard security updates.
To see these additional updates run: apt list --upgradable
Enable ESM Apps to receive additional future security updates.
See https://ubuntu.com/esm or run: sudo pro status
The list of available updates is more than a week old.
To check for new updates run: sudo apt update
Failed to connect to https://changelogs.ubuntu.com/meta-release-lts. Check your Internet connection or proxy settings
Last login: Fri Jun 27 15:19:57 2025 from 192.168.45.182
$ bash
charlie@workaholic:~$ whoami
charlie
charlie@workaholic:~$ hostname
workaholic
charlie@workaholic:~$ ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
3: ens192: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
link/ether 00:50:56:9e:b2:d9 brd ff:ff:ff:ff:ff:ff
altname enp11s0
inet 192.168.136.229/24 brd 192.168.136.255 scope global ens192
valid_lft forever preferred_lft forever
Initial Foothold established to the
workaholic
host as the charlie
user via SSH.