NullByte:1 - Walkthrough [Vulnhub]
Here's my solution for NullByte:1 The Machine can be downloaded from here. Nmap Scanning for all TCP ports. $ nmap -sC -sV -p- 192.168.1.142 We find 4 ports open. Enumeration Browsing the web and checking the source did not reveal any hint. But we observe there is an image, lets download this image and check if we can get any information. $ wget http://192.168.1.142/main.gif $ exiftool main.gif $ strings main.gif We find- kzMb5nVYJw as a hint, which is a directory. Browsing http://192.168.1.142/kzMb5nVYJw/ and checking the source give us the hint- that the key is simple. Using hydra to brute force. $ hydra -P /usr/share/wordlists/rockyou.txt 192.168.1.142 http-form-post "/kzMb5nVYJw/:key=^PASS^:invalid key" -la We get the password as- elite After entering the key, we are landed to /kzMb5nVYJw/index.php Here we enter a random name- root, and we observe the URL, the parameter- usrtosearch= is vulnerable to SQL Injection. We use sqlmap, to enumerate databases. $...