InfoSec Prep: OSCP Walkthrough
reference | InfoSec Prep: OSCP |
target ip | 192.168.1.10 |
Scan with nmap
:

Scan with nmap
ssh-auth-methods
:

Enumerate HTTP with gobuster
:

Request http://192.168.1.10/secret.txt
, which is a base64 encoded file:
1 | curl -s http://192.168.1.10/secret.txt | base64 -d > id_rsa |

Enumerate wordpress, and find username from http://192.168.1.10/index.php/2020/07/09/oscp-voucher/
:

Login into the system via SSH:

Escalate from user oscp to user root, and /root/flag.txt
:

/var/www/html/wp-config.php
:
