Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- root@kali:~# openvpn OS-29363-PWK.ovpn
- Tue Dec 19 09:16:47 2017 OpenVPN 2.4.0 i686-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Feb 2 2017
- Tue Dec 19 09:16:47 2017 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.08
- Enter Auth Username: OS-29363
- Enter Auth Password: ***********
- Tue Dec 19 09:16:53 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]212.199.74.187:1194
- Tue Dec 19 09:16:53 2017 UDP link local (bound): [AF_INET][undef]:0
- Tue Dec 19 09:16:53 2017 UDP link remote: [AF_INET]212.199.74.187:1194
- Tue Dec 19 09:17:53 2017 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Tue Dec 19 09:17:53 2017 TLS Error: TLS handshake failed
- Tue Dec 19 09:17:53 2017 SIGUSR1[soft,tls-error] received, process restarting
- Tue Dec 19 09:17:58 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]212.199.74.187:1194
- Tue Dec 19 09:17:58 2017 UDP link local (bound): [AF_INET][undef]:0
- Tue Dec 19 09:17:58 2017 UDP link remote: [AF_INET]212.199.74.187:1194
- ^CTue Dec 19 09:18:07 2017 event_wait : Interrupted system call (code=4)
- root@kali:~# /root/Downloads/lab-connection/troubleshooting.sh
- [+] Please send the log file './troubleshoot.log' along with the output from the OpenVPN window, with your OSID to 'help@offensive-security.com'.
- [i] Checking User
- uid=0(root) gid=0(root) groups=0(root)
- [i] Date
- Tue Dec 19 09:21:47 EST 2017
- [i] Virtual Machine Check
- VMware Detected
- [i] Network Interfaces
- eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
- inet 192.168.198.128 netmask 255.255.255.0 broadcast 192.168.198.255
- inet6 fe80::20c:29ff:fe85:7708 prefixlen 64 scopeid 0x20<link>
- ether 00:0c:29:85:77:08 txqueuelen 1000 (Ethernet)
- RX packets 69 bytes 6815 (6.6 KiB)
- RX errors 0 dropped 0 overruns 0 frame 0
- TX packets 74 bytes 6125 (5.9 KiB)
- TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
- device interrupt 19 base 0x2024
- lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
- inet 127.0.0.1 netmask 255.0.0.0
- inet6 ::1 prefixlen 128 scopeid 0x10<host>
- loop txqueuelen 1 (Local Loopback)
- RX packets 212 bytes 82094 (80.1 KiB)
- RX errors 0 dropped 0 overruns 0 frame 0
- TX packets 212 bytes 82094 (80.1 KiB)
- TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
- [i] Network Routes
- Kernel IP routing table
- Destination Gateway Genmask Flags Metric Ref Use Iface
- 0.0.0.0 192.168.198.2 0.0.0.0 UG 100 0 0 eth0
- 192.168.198.0 0.0.0.0 255.255.255.0 U 100 0 0 eth0
- [i] DNS Information
- # Generated by NetworkManager
- search localdomain
- nameserver 192.168.198.2
- [i] Ping Test (External: www.Google.com)
- PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.
- 64 bytes from 8.8.8.8: icmp_seq=1 ttl=128 time=27.6 ms
- 64 bytes from 8.8.8.8: icmp_seq=2 ttl=128 time=27.4 ms
- 64 bytes from 8.8.8.8: icmp_seq=3 ttl=128 time=27.7 ms
- 64 bytes from 8.8.8.8: icmp_seq=4 ttl=128 time=27.6 ms
- --- 8.8.8.8 ping statistics ---
- 4 packets transmitted, 4 received, 0% packet loss, time 3008ms
- rtt min/avg/max/mdev = 27.418/27.619/27.743/0.237 ms
- PING www.google.com (216.58.207.164) 56(84) bytes of data.
- 64 bytes from muc11s04-in-f4.1e100.net (216.58.207.164): icmp_seq=1 ttl=128 time=30.7 ms
- 64 bytes from muc11s04-in-f4.1e100.net (216.58.207.164): icmp_seq=2 ttl=128 time=31.9 ms
- 64 bytes from muc11s04-in-f4.1e100.net (216.58.207.164): icmp_seq=3 ttl=128 time=31.8 ms
- 64 bytes from muc11s04-in-f4.1e100.net (216.58.207.164): icmp_seq=4 ttl=128 time=29.7 ms
- --- www.google.com ping statistics ---
- 4 packets transmitted, 4 received, 0% packet loss, time 3001ms
- rtt min/avg/max/mdev = 29.733/31.066/31.912/0.890 ms
- [i] Ping Test (Internal VPN: 10.11.1.220)
- PING 10.11.1.220 (10.11.1.220) 56(84) bytes of data.
- --- 10.11.1.220 ping statistics ---
- 8 packets transmitted, 0 received, 100% packet loss, time 7169ms
- [i] External IP
- 94.253.204.186
- [i] UDP Port Test
- [-] Multiple connection packs, please remove the old one(s)
- /root
- 790500 12 -rwxrw-rw- 1 root root 9470 Nov 8 11:08 ./shelldone2.ovpn
- 808765 8 -rw-r--r-- 1 root root 6044 Nov 22 06:29 ./OS-29363-PWK.ovpn
- total 2.7M
- drwxr-xr-x 33 root root 4.0K Dec 19 09:21 .
- drwxr-xr-x 25 root root 4.0K Jun 15 2017 ..
- -rwxr-xr-x 1 root root 9.3K Dec 11 11:01 24017.html
- -rwxr-xr-x 1 root root 3.1K Dec 7 08:03 643-fixed.c
- -rwxr-xr-x 1 root root 356K Dec 7 10:13 646.exe
- -rw-r--r-- 1 root root 4.2K Dec 7 09:35 646-fixed.c
- drwxr-xr-x 2 root root 4.0K Jun 7 2017 A
- -rw-r--r-- 1 root root 1.2M Apr 26 2016 access_log.txt.gz
- -rw-r--r-- 1 root root 2.3K Jul 17 15:40 .armitage.prop
- -rw-r--r-- 1 root root 1.1K Dec 1 10:48 badchars.txt
- -rwxr-xr-x 1 root root 1.9K Nov 30 10:02 bapro.py
- -rw------- 1 root root 63K Dec 18 13:52 .bash_history
- -rwxr-xr-x 1 root root 0 Nov 22 10:12 bashpingsweep
- -rw-r--r-- 1 root root 3.4K Sep 5 2016 .bashrc
- -rw-r--r-- 1 root root 1.0K May 16 2017 .boris.sh.swp
- -rw-r--r-- 1 root root 0 May 24 2017 .brico.py.swp
- drwx------ 16 root root 4.0K Nov 24 14:01 .cache
- -rw-r--r-- 1 root root 23 Nov 23 13:52 community
- drwxr-xr-x 23 root root 4.0K Dec 11 13:24 .config
- -rwxr-xr-x 1 root root 1.1K Dec 6 09:17 crossfire-poc.py
- -rwxr-xr-x 1 root root 315 Dec 5 09:22 crossfire-poc.py.save
- -rwxr-xr-x 1 root root 1.1K Dec 5 08:59 crossfire.py
- drwx------ 3 root root 4.0K May 18 2017 .dbus
- drwxr-xr-x 2 root root 4.0K Jul 21 19:37 Desktop
- -rw-r--r-- 1 root root 225 Jul 21 18:38 Discovery.gnmap
- -rwxr-xr-x 1 root root 28 Nov 23 08:42 dns.sh
- drwxr-xr-x 2 root root 4.0K Sep 7 2016 Documents
- drwxr-xr-x 4 root root 4.0K Dec 9 12:19 Downloads
- drwxr-xr-x 6 root root 4.0K Dec 18 10:07 exercises
- -rw-r--r-- 1 root root 11K Dec 11 09:16 exploit.html
- drwxr-xr-x 11 root root 4.0K Aug 7 09:17 .faraday
- -rw-r--r-- 1 root root 576 Nov 23 10:54 firstmachine.txt
- -rwxr-xr-x 1 root root 417 Nov 24 14:45 fuzzer.py
- drwx------ 2 root root 4.0K Dec 6 09:07 .gconf
- drwx------ 3 root root 4.0K May 18 2017 .gnupg
- -rwxr-xr-x 1 root root 2.5K Dec 2 09:45 hehe1
- -rwxr-xr-x 1 root root 2.1K Dec 2 09:46 hehe1.py
- -rw-r--r-- 1 root root 73 Dec 12 13:18 hehe.txt
- -rw------- 1 root root 22K Dec 19 09:10 .ICEauthority
- -rw-r--r-- 1 root root 18K Dec 11 08:49 index.html
- -rw-r--r-- 1 root root 2.9K Nov 23 13:53 ips
- drwxr-xr-x 4 root root 4.0K Aug 5 15:21 .java
- -rw-r--r-- 1 root root 2.0K Dec 11 13:20 Java.class
- -rw-r--r-- 1 root root 1.8K Dec 11 13:21 Java.jar
- -rw-r--r-- 1 root root 1.3K Dec 11 13:06 Java.java
- drwx------ 2 root root 4.0K Aug 7 09:23 .john
- drwxr-xr-x 18 root root 4.0K Dec 18 10:07 LAB
- -rw------- 1 root root 28 Jul 20 13:53 .lesshst
- drwx------ 3 root root 4.0K Sep 7 2016 .local
- -rw-r--r-- 1 root root 35 Dec 11 13:20 manifest.txt
- -rw-r--r-- 1 root root 1.0K May 30 2017 .moja.py.swp
- -rw-r--r-- 1 root root 13 Nov 22 09:01 mojeime.txt
- drwx------ 4 root root 4.0K May 14 2017 .mozilla
- drwxr-xr-x 8 root root 4.0K Sep 7 2016 .msf4
- drwxr-xr-x 2 root root 4.0K Sep 7 2016 Music
- -rw-r--r-- 1 root root 1.4K Dec 11 11:31 mykeystore
- drwxr-xr-x 2 root root 4.0K May 14 2017 .nano
- -rwxr-xr-x 1 root root 384 Nov 24 14:29 nc110.py
- -rw-r--r-- 1 root root 1.0K May 20 2017 .neki.sh.swp
- -rw-r--r-- 1 root root 1.0K Jun 15 2017 .of.py.swp
- -rw-r--r-- 1 root root 6.0K Nov 22 06:29 OS-29363-PWK.ovpn
- drwxr-xr-x 32 root root 4.0K Dec 18 13:53 oscp
- drwxr-xr-x 2 root root 4.0K Nov 23 06:40 Pictures
- -rwxr-xr-x 1 root root 2.5K Dec 1 15:16 poc.py
- -rw-r--r-- 1 root root 148 Aug 31 2016 .profile
- drwxr-xr-x 2 root root 4.0K Sep 7 2016 Public
- -rwxr-xr-x 1 root root 263 Nov 22 08:58 pythonpingsweep
- -rw-r--r-- 1 root root 508 Nov 23 10:31 rangeips.txt
- -rw-r--r-- 1 root root 1.6K Nov 23 10:26 rangepingsweep.txt
- drwxr-xr-x 3 root root 4.0K May 20 2017 .recon-ng
- -rw------- 1 root root 1.0K Sep 7 2016 .rnd
- drwxr-xr-x 2 root root 4.0K Jun 2 2017 Scans
- -rwxr-xr-x 1 root root 351K Dec 9 09:54 scsiaccess.exe
- -rwxrw-rw- 1 root root 9.3K Nov 8 11:08 shelldone2.ovpn
- -rw-r--r-- 1 root root 3.3K Dec 11 13:22 SignedJava.jar
- -rwxr-xr-x 1 root root 8.3K Dec 7 08:04 slmail-linux
- -rwxr-xr-x 1 root root 1.9K Nov 27 22:10 slmail.py
- -rw-r--r-- 1 root root 403 Nov 23 12:14 smbservers.txt
- drwxr-xr-x 3 root root 4.0K Jul 17 10:13 .sqlmap
- drwx------ 2 root root 4.0K May 16 2017 .ssh
- drwxr-xr-x 2 root root 4.0K Sep 7 2016 Templates
- -rw-r--r-- 1 root root 3.0K Dec 19 09:22 troubleshoot.log
- -rw-r--r-- 1 root root 1.0K May 20 2017 .tzt.sh.swp
- -rwxr-xr-x 1 root root 351K Dec 9 11:57 useradd.exe
- drwxr-xr-x 2 root root 4.0K Sep 7 2016 Videos
- -rwxr-xr-x 1 root root 2.0K Dec 1 12:38 vulnserver.py
- -rw-r--r-- 1 root root 259 Dec 11 09:16 .wget-hsts
- -rw-r--r-- 1 root root 114 Dec 9 11:56 winadduser.c
- drwxr-xr-x 4 root root 4.0K Dec 7 10:16 .wine
- drwxr-xr-x 4 root root 4.0K Dec 2 10:22 Working exploits
- drwxr-xr-x 2 root root 4.0K Aug 8 09:33 .zenmap
- [i] Checking Kernel Version
- Linux kali 4.9.0-kali4-686 #1 SMP Debian 4.9.25-1kali1 (2017-05-04) i686 GNU/Linux
- [i] Checking OS
- Kali GNU/Linux Rolling \n \l
- DISTRIB_ID=Kali
- DISTRIB_RELEASE=kali-rolling
- DISTRIB_CODENAME=kali-rolling
- DISTRIB_DESCRIPTION="Kali GNU/Linux Rolling"
- PRETTY_NAME="Kali GNU/Linux Rolling"
- NAME="Kali GNU/Linux"
- ID=kali
- VERSION="2017.1"
- VERSION_ID="2017.1"
- ID_LIKE=debian
- ANSI_COLOR="1;31"
- HOME_URL="http://www.kali.org/"
- SUPPORT_URL="http://forums.kali.org/"
- BUG_REPORT_URL="http://bugs.kali.org/"
- [+] Test complete.
- [+] Please send the log file './troubleshoot.log' along with the output from the OpenVPN window, with your OSID to 'help@offensive-security.com'.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement