CyberSploit: 2 Walkthrough
| reference | CyberSploit: 2 |
| target ip | 192.168.1.7 |
Scan with nmap:
Enumerate http://192.168.1.7:
Decode the user’s password with CyberChef.
Login with username shailendra:
Enumerate the current user, which reveals to group docker:
Related post is Privilege escalation via Docker.
Escalate from user shailendra to user root using chrisfosterelli/rootpleas:
/root/flag.txt: