CyberSploit: 2 Walkthrough
reference | CyberSploit: 2 |
target ip | 192.168.1.7 |
Scan with nmap
:

Enumerate http://192.168.1.7
:

Decode the user’s password with CyberChef
.
Login with username shailendra:

Enumerate the current user, which reveals to group docker:

Related post is Privilege escalation via Docker.
Escalate from user shailendra to user root using chrisfosterelli/rootpleas:

/root/flag.txt
:
