CyberSploit: 2 Walkthrough
reference | CyberSploit: 2 |
target ip | 192.168.1.7 |
Scan with nmap
:
Enumerate http://192.168.1.7
:
Decode the user’s password with CyberChef
.
Login with username shailendra:
Enumerate the current user, which reveals to group docker:
Related post is Privilege escalation via Docker.
Escalate from user shailendra to user root using chrisfosterelli/rootpleas:
/root/flag.txt
: