Bounty Hacker
Room Covers:
Service Discovery
Local Privilege Escalation
Target Details
IP: 10.10.160.10
Service Discovery
Using nmap
Scan Results
OS: Ubuntu
Services Found
ServicePortVersionHTTP
80
Apache/2.4.18
FTP
21
vsftpd 3.0.3
SSH
22
OpenSSH 7.2p2
Try Accessing FTP
Trying to access FTP anonymously
We get successfully logged in as anonymous user
list and download files
locks.txt
file appears to be a wordlist
Bruteforce SSH service
Assuming user to be lin from
task.txt
file, we bruteforce this account with downloadedlocks.txt
filePassword: RedDr4gonxxxxxxxxx
We've successfully found the SSH password for user lin
Login to SSH
Login Details
UserPasswordlin
RedDr4gonxxxxxxxxx
Login to SSH using above details
Privilege Escalation
Find SUID files
sudo
can be used by lin, hence to find commands that can be used by lin and executed as root, we run below command/bin/tar
can be executed by lin as rootSearching for tar on GTFObins, we can escalate privileges using below command
Machine is now rooted
Get Flags
User Flag
Root Flag
Last updated