RandomUser888dda
Static Analysis Expert
2
MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1
100 XP

Hey Folks, today we are going to solve another boot2root challenge vulnerable VM machine called “CyberSploit: 2“. This machine is made by Cyberspace which is an easy level lab. There is no flag

Machine Details
Author: CyberSploit
Series: CyberSploit
Lets do it

Reconnaissance
Like always, first we will find the host IP address of vulnerable machine by using the “netdiscover” command.
netdiscover1netdiscover

We got target IP address and now our next step is to find open ports using the Namp tool.
nmap -p- -A 192.168.0.1051nmap-p--A192.168.0.105

The port 80 is running on that machine. After browse the IP address we got a multiple credentails but lets check the page source.

Alright ! We found a ROT47 hint in the page source. Now we will decrypt the credentials in ROT47 which are given on the front page.

We uses the cyber chef github project for this kind of challengers. After decrypts the code we got a user and password.

username – shailendra
password – cybersploit1
We access the ssh service with the obtained username and password.
ssh [email protected] [email protected]

After login we get another hint which has dcoker written in it.

Privilege Escalation
After search we found a docker shell on gfobins website that can be used to break out from restricted environments by spawning an interactive system shell.

After executing this we get final flag in the root directory.
docker run -v /:/mnt --rm -it alpine chroot /mnt sh1docker run-v/:/mnt--rm-it alpine chroot/mnt sh
