Sponsored
Ctf Challenges

CyberSploit: 1 Vulnhub Walkthrough

Hey Folks, today we are going to solve boot2root challenge vulnerable VM machine called β€œCyberSploit: 1β€œ. VulnHub is a free community resource where the machine is hosted. This machine is made by Cyberspace which is an easy level lab.

Machine Details

Name: CyberSploit: 1
Author: CyberSploit

Useful Tools

  • Netdiscover
  • nmap
  • dirb
  • base64

It is available on vulnhub website whose the link are here.

Lets download the lab and enjoy the article πŸ™‚ !!

Flag -1

Now first we will identify the host IP address by use of β€œnetdiscover” tool.

netdiscover

The second step is to find the open ports or service with nmap tool.

nmap -sV 192.168.0.104

As you can see that the apache2 service or port 80 is running on that machine. Now we will open the host address on the browser and try to find some juicy information.

We found an SSH username in the back-end coding of the web page.
Username : itsskv

Enumeration

Lets move on enumeration part and try to find hidden files in the web server. We will use the dirb tool.

dirb http://192.168.0.104 -w /usr/share/dirb/wordlists/common.txt

We found one important file β€œroboot.txt”. We will download it by wget command.

wget http://192.168.0.104/robots.txt

The files is encrypted with base64. Lets try to decode it by in-built base64 tool.

cat robots.txt
echo "R29vZCBXb3JrICEKRmxhZzE6IGN5YmVyc3Bsb2l0e3lvdXR1YmUuY29tL2MvY3liZXJzcGxvaXR9" | base64 -d

We have got first 🚩 flag πŸ™‚ !!

Flag -2

We got the first flag containing ssh password and we have already obtained the username of ssh from the web page. Now we will login into ssh service to find the second flag.

ssh itsskv@192.168.0.104

We have found the second flag but it is encrypted in binary. Lets try to decrypt it by using online website.

We have succeeded in decrypting the second flag. The website link is here.

Flag -3

Let’s move to find the third flag. We notice the kernel version is exploitable that means we can get root privileges by perform this exploit.
Name : Linux Kernel 3.13.0
Link : https://www.exploit-db.com/exploits/37292

Lets find the exploit with search sploit framework.

searchsploit Linux Kernel 3.13.0

We will download the exploit and paste into the β€œtmp” directory. After execute the exploit we get a root shell and after go to the root directory we got our last flag that you can see below.

About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
Sponsored

View Comments

Recent Posts

Gau (GetAllUrls) – Find Known and Hidden URL

The gau (Get All URLs) tool is a versatile open-source utility that collects URLs from…

3 months ago

Jsluicepp – Burp Extension for JS Secrets – BugBountyTip

Jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic…

8 months ago

Bypassing Firewalls (WAF) with XSS Payloads

Hey Folks :) !! In this tutorial, we will describe some of the techniques commonly…

8 months ago

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

1 year ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

2 years ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

3 years ago
Sponsored

This website uses cookies.