Thanks to visit codestin.com
Credit goes to Github.com

Skip to content

btray900/zico2

Repository files navigation

zico2

boot2root vm walkthrough

netdiscover

netdiscover finds us the VM IP: 192.168.56.104 kali ip: 192.168.56.103

Alt text

nmap

nmap shows what is available for tcp

Alt text

browse

browsing the webste leads us to an LFI candidate

Alt text

lfi

LFI was successful. SSH with cracked credentials from below was unsuccessful for me

Alt text

dirb

dirb found the directory 'dbadmin' with phpLiteAdmin/1.9.3 web app. Default password works

Alt text

webapp users

Alt text

poc

Google for the web app gives us a PoC

Alt text

php is crafted for injection

Alt text

visit the db page, you should see a web log hit on your attacker

Alt text

low-level shell

poc returns a low-level shell

Alt text

enumerate

interpreters and compilers available

Alt text

os version

Alt text

kernel exploit

Google sends us to a candidate. The targets are slightly different than our kernel but worth a shot for quick escalation

Alt text

root 1

Upgrading the shell to tty allows successful exploitation. But this is not in the spirit of the VM where enumeration is more challenging to find a way for escalation

Alt text

enumeration - method 2

Compromise a password in wordpress config

Alt text

ssh

SSH as zico with compromised credentials gives a low-level shell

Alt text

sudo

sudo -l (el) lists sudo commands we can run

Alt text

fu

Searching the web describes how to run arbitrary code with tar

Alt text

malicious binary

compile a malicious binary

Alt text

exploit for root

\(*_*)
  ( (>
  /  \

sudo tar ftw

Alt text

ctf

Alt text

thanks

thanks to rafael for the vm

About

boot2root vm walkthrough

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published