CyberSploit:1 - Walkthrough [Vulnhub]

Here's my solution for CyberSploit:1.
The Machine can be downloaded from here.

Nmap
Starting with nmap scanning for all TCP open ports.
nmap -sC -sV -p- 192.168.1.109



we find only 2 ports open.

Directory Scanning
Browsing the website, checking the source gives us a hint.
username: itsskv



Tried brute forcing ssh, but did not get the result.

Scanning directories with dirb.
dirb http://192.168.1.109/


The robots.txt, has base64 encoded strings.


Lets decode




And we get the first flag-
Flag1: cybersploit{youtube.com/c/cybersploit}
which also happens to be the password for user itsskv.

Getting Access
ssh itsskv@192.168.1.109
password: cybersploit{youtube.com/c/cybersploit}

Getting the second flag.


Seems the second flag has a hint which is in binary format.
Lets decode, browsed RapidTables.


And we get the second flag-
flag2: cybersploit{https:t.me/cybersploit1}

Privilege Escalation
Checking the kernel version, reveals an older version.


Searching for kernal exploit.


Lets get this 37292.c file and transfer it to target machine.


Run the exploit.


The final flag.


Comments

Popular posts from this blog

Sunset:Noontide - Walkthrough [Vulnhub]

CyberSploit:2 - Walkthrough [Vulnhub]

BBS(cute):1.0.1 - Walkthrough [Vulnhub]