Cybersploit¶
Port scan¶
22/tcp open ssh syn-ack ttl 64 OpenSSH 5.9p1 Debian 5ubuntu1.10 (Ubuntu Linux; protocol 2.0)
80/tcp open http syn-ack ttl 64 Apache httpd 2.2.22 ((Ubuntu))
Port 80¶
Homepage, none of the nav buttons appear to do anything.
Found a username itsskv
in the HTML comments
Robots.txt has a long string
Long string base64 decoded:
Good Work !
Flag1: cybersploit{youtube.com/c/cybersploit}
Now have some secret data and a username, tried logging in:
ssh itsskv@192.168.1.114
Password: cybersploit{youtube.com/c/cybersploit}
It worked
found another flag
cybersploit{https:t.me/cybersploit1}
I tried to su to cybersploit user and to root using this flag as the password. That did not work.
I ran linpeas and didn't see any config issues.
The only thing that really stands out is the old linux version. Linux-exploit-suggester recommends dirtycow
(fail),dirtycow2
(fail), overlay-fs
(pass)
Privesc with overlayfs¶
Using edb-37292 (CVE-2015-1328) I was able to get a root shell.
cybersploit{Z3X21CW42C4 many many congratulations !}