Sponsored
Ctf Challenges

CyberSploit: 2 Vulnhub Walkthrough

Hey Folks, today we are going to solve another boot2root challenge vulnerable VM machine called “CyberSploit: 2“. This machine is made by Cyberspace which is an easy level lab. There is no flag 🚩 in this challenge, just us to gain the root access of VM machine. As long as I describe you some details, you should download VM from here.

Machine Details

Author: CyberSploit
Series: CyberSploit

Lets do it 🙂 !!

Reconnaissance

Like always, first we will find the host IP address of vulnerable machine by using the “netdiscover” command.

netdiscover

We got target IP address and now our next step is to find open ports using the Namp tool.

nmap -p- -A 192.168.0.105

The port 80 is running on that machine. After browse the IP address we got a multiple credentails but lets check the page source.

Alright ! We found a ROT47 hint in the page source. Now we will decrypt the credentials in ROT47 which are given on the front page.

We uses the cyber chef github project for this kind of challengers. After decrypts the code we got a user and password.

username – shailendra
password – cybersploit1

We access the ssh service with the obtained username and password.

ssh shailendra@192.168.0.105

After login we get another hint which has dcoker written in it.

Privilege Escalation

After search we found a docker shell on gfobins website that can be used to break out from restricted environments by spawning an interactive system shell.

After executing this we get final flag in the root directory.

docker run -v /:/mnt --rm -it alpine chroot /mnt sh
About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
Sponsored

Recent Posts

Gau (GetAllUrls) – Find Known and Hidden URL

The gau (Get All URLs) tool is a versatile open-source utility that collects URLs from…

3 months ago

Jsluicepp – Burp Extension for JS Secrets – BugBountyTip

Jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic…

8 months ago

Bypassing Firewalls (WAF) with XSS Payloads

Hey Folks :) !! In this tutorial, we will describe some of the techniques commonly…

8 months ago

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

1 year ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

2 years ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

3 years ago
Sponsored

This website uses cookies.