Method
Last updated
Last updated
To find the IP of the victim machine, I use the arp-scan command to discover the devices connected to my local network and locate the one whose MAC address starts with 08:, indicating it is a VirtualBox virtual machine.
Next, we proceed with a quick scan using NMAP to see which ports are open.
And now we perform a more detailed scan on those open ports and save the result in a file called target.txt.
We observe a website hosted on this machine via port 80, but only the default homepage is visible.
I use Gobuster to enumerate hidden files and directories. We find a file called note.txt that tells us the solution is to enumerate.
I decide to continue enumerating more directories and files (zip, htm, php, c). I come across the directory index.htm, which contains the following:
Upon inspecting the page source with Ctrl + U, we notice a hidden form that calls a file named secret.php and uses the GET method. It includes an input name "HackMyVM".
I'm going to send a request with all the data collected earlier.
It tells us to use another method. To do this, I'll use the POST method. In Burp Suite, we have an option to convert from GET to POST and vice versa with just the click of a button.
It says we already found it, so let's put some value in the request.
And we see that we have access to the victim machine as the user www-data (the web server user). I'm going to send myself a Reverse Shell and handle the TTY.
Now that we're inside, let's enumerate the existing users on the machine.
We find the user prakasaka and the root user.
I decide to go to the directory of prakasaka and we see that we can read the User Flag as www-data.
But let's not get ahead of ourselves, the next thing we should do to escalate privileges is to read the file secret.php, and we find the password for the user prakasaka.
Now it's time to escalate privileges to root. To do this, we execute the command sudo -l to see the commands that prakasaka can run with sudo privileges.
We can execute /bin/ip as root, so let's go to GTFObins and run the commands it shows us to escalate to root. In this case, we will use the following commands:
And there we go, we're now the root user and can obtain the Root Flag.