CyberSploit: 1 Walkthrough
reference | CyberSploit: 1 |
target ip | 192.168.1.6 |
Scan with nmap
:
Enumerate HTTP with gobuster
:
Request http://192.168.1.6/robots
, and decode:
Request http://192.168.1.6
:
Use flag1 as the SSH password:
/home/itsskv/flag2.txt
:
Convert from binary to text using this site:
Enumerate OS version:
Escalate from user itsskv to user root with Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - ‘overlayfs’ Local Privilege Escalation:
/root/finalflag.txt
: