CyberSploit:1 - Walkthrough [Vulnhub]
Here's my solution for CyberSploit:1.
The Machine can be downloaded from here.
Nmap
Starting with nmap scanning for all TCP open ports.
nmap -sC -sV -p- 192.168.1.109
we find only 2 ports open.
Directory Scanning
Browsing the website, checking the source gives us a hint.
Getting Access
ssh itsskv@192.168.1.109
password: cybersploit{youtube.com/c/cybersploit}
Getting the second flag.
Seems the second flag has a hint which is in binary format.
Lets decode, browsed RapidTables.
The Machine can be downloaded from here.
Nmap
Starting with nmap scanning for all TCP open ports.
nmap -sC -sV -p- 192.168.1.109
we find only 2 ports open.
Directory Scanning
Browsing the website, checking the source gives us a hint.
username: itsskv
Tried brute forcing ssh, but did not get the result.
Scanning directories with dirb.
dirb http://192.168.1.109/
dirb http://192.168.1.109/
The robots.txt, has base64 encoded strings.
Lets decode
And we get the first flag-
Flag1: cybersploit{youtube.com/c/cybersploit}
which also happens to be the password for user itsskv.
Getting Access
ssh itsskv@192.168.1.109
password: cybersploit{youtube.com/c/cybersploit}
Getting the second flag.
Lets decode, browsed RapidTables.
And we get the second flag-
flag2: cybersploit{https:t.me/cybersploit1}
Privilege Escalation
Checking the kernel version, reveals an older version.
Checking the kernel version, reveals an older version.
Searching for kernal exploit.
Lets get this 37292.c file and transfer it to target machine.
Run the exploit.
The final flag.
Comments
Post a Comment