THM | Vulnversity

Mansoor Barri
2 min readAug 18, 2023

--

Deloy the machine

No answer needed

Reconnaissance

There are many Nmap “cheatsheets” online that you can use too.

No answer needed

Scan the box; how many ports are open?

6

What version of the squid proxy is running on the machine?

3.5.12

How many ports will Nmap scan if the flag -p-400 was used?

400

What is the most likely operating system this machine is running?

Ubuntu

What port is the web server running on?

3333

It’s essential to ensure you are always doing your reconnaissance thoroughly before progressing. Knowing all open services (which can all be points of exploitation) is very important, don’t forget that ports on a higher range might be open, so constantly scan ports after 1000 (even if you leave checking in the background)

No answer needed

What is the flag for enabling verbose mode using Nmap?

-v

Locating directories using Gobuster

What is the directory that has an upload form page?

/internal

Compromise the Webserver

What common file type you’d want to upload to exploit the server is blocked? Try a couple to find out.

.php

Run this attack, what extension is allowed?

.phtml

What is the name of the user who manages the webserver?

bill

What is the user flag?

8bd7992fbe8a6ad22a63361004cfcedb

Privilege Escalation

On the system, search for all SUID files. Which file stands out?

/bin/systemctl

Become root and get the last flag (/root/root.txt)

a58ff8579f0a9270368d33a9966c7fd5

that’s it ❤

--

--

Mansoor Barri
Mansoor Barri

Written by Mansoor Barri

Profile designed to share technology content about Penetration testing, Linux and Windows.

No responses yet