April 20th 2023
OG Vulnhub box: https://www.vulnhub.com/entry/cybersploit-1,506/
Since target was given I don't have to run netdiscover to find target:
Target is: 192.168.52.92
Check firefox on 80
This image shows up. Time to check directories and subdirectories. Time to run dirb and subdirwith the former for directories(website.com/page1) and latter for subdirectories such as app.website.com
Saw robots.txt so going there and I find a base64 looking string
AI decoding with cyberchef verification yields
Checking page source code also nets the user itsskv
Try logging into ssh now with the username and the base64 password
ls in . and see flag2.txt but after a cat the flag is another file. Checking out local.txt I find a string of text which I submit as the flag and get the first 50%.
Now for root.
Checking the OS version first
Now to check for local exploits on Ubuntu 12.04.5 LTS on exploitdb
Now downloading one of the exploits for local. Will use the overlayFS one as it's the "latest" one
Now the c exploit is on the target machine for a local privesc
Now time to compile the c code then run the program
Opportunity to upgrade shell to a more stable one here. Use shell upgrade commands.
Now to look through root's files
And Boot2Root 🐱💻