Post

CyberSploit1 Writeup

CyberSploit1 Writeup

✋🏻 Hi, In this write-up we are going to pwn one of prouving grounds play mahines on Offensive Security, which is CyberSploit1.

Enumeration and Initial Access

The first step is to scan the machine with nmap

$ nmap -sV -sC -p- -A -T4 192.168.215.92

status

This machine has:

  • A web interface running on port 80

After checking the web interface, there isn’t anything juicy there, let’s take a look at the /robots.txt file robots.txt

status

Since it is encrypted with base64, let’s decrypt it

status

Maybe it will be usefull later on

So let’s move on to fuzzing the directories

status

Nothing is usefull here

After checking the source code of the first page

fuzz

There’s a username here

Let’s try logging in with this username since SSH is running

fuzz

Awesome, there’s a user with this name

For the password let’s try the output from decrypting the robots.txt

license

And bam, it’s workiiing

license


Privilege Escalation

Now it’s time for privilege escalation

Using the CVE-2021-4034 :

key3

And we’re done, we’ve successfully compromised the machine

See you in another writeup. ✌️

This post is licensed under CC BY 4.0 by the author.