• We just launched and are currently in beta. Join us as we build and grow the community.

CyberSploit: 2 Vulnhub Walkthrough

RandomUser888dda

Static Analysis Expert
R Rep
0
0
0
Rep
0
R Vouches
0
0
0
Vouches
0
Posts
67
Likes
119
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 100 XP
2-17.png


Hey Folks, today we are going to solve another boot2root challenge vulnerable VM machine called “CyberSploit: 2“. This machine is made by Cyberspace which is an easy level lab. There is no flag 🚩 in this challenge, just us to gain the root access of VM machine. As long as I describe you some details, you should download VM from here.

Machine Details

Author: CyberSploit
Series: CyberSploit

Lets do it 🙂 !!

Reconnaissance

Like always, first we will find the host IP address of vulnerable machine by using the “netdiscover” command.

netdiscover1netdiscover

1-se-phele-1.png


We got target IP address and now our next step is to find open ports using the Namp tool.

nmap -p- -A 192.168.0.1051nmap-p--A192.168.0.105

1-13.png


The port 80 is running on that machine. After browse the IP address we got a multiple credentails but lets check the page source.

2-16.png


Alright ! We found a ROT47 hint in the page source. Now we will decrypt the credentials in ROT47 which are given on the front page.

3-12.png


We uses the cyber chef github project for this kind of challengers. After decrypts the code we got a user and password.

4-12-1024x450.png


username – shailendra
password – cybersploit1

We access the ssh service with the obtained username and password.

ssh [email protected] [email protected]

5-12-1024x185.png


After login we get another hint which has dcoker written in it.

6-11.png

Privilege Escalation

After search we found a docker shell on gfobins website that can be used to break out from restricted environments by spawning an interactive system shell.

7-9.png


After executing this we get final flag in the root directory.

docker run -v /:/mnt --rm -it alpine chroot /mnt sh1docker run-v/:/mnt--rm-it alpine chroot/mnt sh

8-8.png
About the AuthorShubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
 

452,292

324,125

324,133

Top