This lab illustrates how easy it is
to compromise the root password (1) if you have physical access to the
machine, and (2) don't know the root password.
A counter-measure to this exploit, is to
set the power-on password.
Lab Notes
In this lab we will do the following:
We will access the Grub menu during the
boot process.
We will edit the Grub menu to boot into
single user mode.
We will change the root password.
Legal Disclaimer
As a condition of your use of this Web
site, you warrant to computersecuritystudent.com that you will not use
this Web site for any purpose that is unlawful or
that is prohibited by these terms, conditions, and notices.
In accordance with UCC § 2-316, this
product is provided with "no warranties, either express or implied." The
information contained is provided "as-is", with "no guarantee of
merchantability."
In addition, this is a teaching website
that does not condone malicious behavior of
any kind.
You are on notice, that continuing
and/or using this lab outside your "own" test environment
is considered malicious and is against the law.
Navigate to where the Metasploitable VM
is located
Click on on the Metasploitable VM
Click on the Open Button
Edit the Metasploitable VM
Instructions:
Select Metasploitable2-Linux VM
Click Edit virtual machine settings
Edit the Metasploitable VM
Instructions:
Click on "Network Adapter NAT"
Select the radio button "Bridged:
Connected directly to the physical network"
Click on the OK button
Warning:
By changing from NAT to Bridged opens
the VM and network up to potential attacks.
To maintain a safe network, you could
(1) skip this section and only use the host-only network, (2) unplug
your router from the internet, (3) use an ACL to not allow traffic
into your network, etc.
Play the Metasploitable VM
Instructions:
Click on the Metasploitable VM
Click on Play virtual machine
Section 2: Boot to
Grub Menu
VMWare Menu
Instructions
Once you see the below vmware screen,
(1) Left Click in the screen