

#Parrot os file permission password
Then log into the remote host with the victim user and own password Step 7: The approach here will be to create own SSH keys and append the newly created public key into the authorized_key of the victim user.

This folder contains the public, private and authorized key for the SSH login for the specific user Step 6: Navigate to any user directory and locate the. The content listed is from the /home folder of the remote host Step 5: Navigate to /tmp/infosec directory and list the content. Once the command is executed, the following command can be used to check the directory mount: tmp/infosec: The remote home folder to be mounted on the local /tmp/infosec folder. t: Specifies the type of file system that performs the logical mount request. Step 4: Create a new directory under the tmp folder of Kali and run the following command to mount the home directory on this newly created directory If you see any IP address or the IP range defined in front of the directory, that means only the machine with that specific IP or range is allowed to mount the directory, which is a good security practice. Note the asterisk sign in front of /home, which means every machine on the network is allowed to mount the /home folder of this machine. Step 3: Check if any share is available for mount, using showmount tool in Kali: Step 2: The port scan result shows the port 2049 is open and nfs service is running on it Step 1: Start with nmap service fingerprint scan on the IP address of the hosted machine:

Now, let’s start our Kali Linux machine to perform the penetration testing. Sudo /etc/init.d/nfs-kernel-server restart After doing the changes, run the following command to restart the NFS service: This file contains the configuration for NFS. To simulate the exact scenario, I have modified the export directory from “/” (root) to “/home” under “/etc/exports” file. Note the IP address of the hosted machine by running “ifconfig” command. Enter “msfadmin” as username and password when prompted for login.
