githubEdit

6000 - Pentesting X11

circle-check

Join HackenProof Discordarrow-up-right server to communicate with experienced hackers and bug bounty hunters!

Hacking Insights Engage with content that delves into the thrill and challenges of hacking

Real-Time Hack News Keep up-to-date with fast-paced hacking world through real-time news and insights

Latest Announcements Stay informed with the newest bug bounties launching and crucial platform updates

Join us on Discordarrow-up-right and start collaborating with top hackers today!

Basic Information

X Window System (X) is a versatile windowing system prevalent on UNIX-based operating systems. It provides a framework for creating graphical user interfaces (GUIs), with individual programs handling the user interface design. This flexibility allows for diverse and customizable experiences within the X environment.

Default port: 6000

Enumeration

Check for anonymous connection:

Local Enumeration

The file .Xauthority in the users home folder is used by X11 for authorization. From herearrow-up-right:

MIT-magic-cookie-1: Generating 128bit of key (“cookie”), storing it in ~/.Xauthority (or where XAUTHORITY envvar points to). The client sends it to server plain! the server checks whether it has a copy of this “cookie” and if so, the connection is permitted. the key is generated by DMX.

circle-exclamation

Local Enumeration Session

In the example, localhost:0 was running xfce4-session.

Verfy Connection

Keyloggin

xspyarrow-up-right to sniff the keyboard keystrokes.

Sample Output:

Screenshots capturing

Remote Desktop View

Way from: https://resources.infosecinstitute.com/exploiting-x11-unauthenticated-access/#grefarrow-up-right

Way from: https://bitvijays.github.io/LFF-IPS-P2-VulnerabilityAnalysis.htmlarrow-up-right

First we need to find the ID of the window using xwininfo

XWatchwin

For live viewing we need to use

Get Shell

Other way:

Reverse Shell: Xrdp also allows to take reverse shell via Netcat. Type in the following command:

In the interface you can see the R-shell option.

Then, start a Netcat listener in your local system on port 5555.

Then, put your IP address and port in the R-Shell option and click on R-shell to get a shell

References

Shodan

  • port:6000 x11

Join HackenProof Discordarrow-up-right server to communicate with experienced hackers and bug bounty hunters!

Hacking Insights Engage with content that delves into the thrill and challenges of hacking

Real-Time Hack News Keep up-to-date with fast-paced hacking world through real-time news and insights

Latest Announcements Stay informed with the newest bug bounties launching and crucial platform updates

Join us on Discordarrow-up-right and start collaborating with top hackers today!

circle-check

Last updated