Problem 1: How did enum4linux find usernames on Victim #2? What protocol(s) and ports did it use?
Problem 2: What does -i do when we used it with ssh?
Problem 3: Why did the recent ssh on kali Linux object to using id_rsa? and why ssh on the victim did not?
Problem 4: What was the command we used to access SMB/SAMBA?
Problem 5: What was the NSE scripts used by nmap -A command to enumerate SMB?
Problem 6: What prevented us from using c language exploits form exploit-db to escalate privileges? Suggest at least one option to be able to run such exploits on victim #2?
Problem 7: What was the main misconfiguration in victim #2 that allowed us to use id_rsa to exploit privileges?
Problem 8: What did ssh2john do to id_rsa?
Problem 9: John the ripper stores the passwords previously cracked, what is the john command to display previously cracked password on id_rsa (Breakable)?
Problem 10: Provide to different commands to copy id_rsa from victim #2 to Kali?