OffSec Proving Grounds - CyberSploit1
THIS IS A MACHINE FOR COMPLETE BEGINNER , THERE ARE THREE FALGS AVAILABLE IN THIS VM. FROM THIS VMs YOU WILL LEARN ABOUT ENCODER-DECODER & EXPLOIT-DB.
As you can see, the bar has been set pretty high…
Easy box, but User is pretty poorly done. Root was just ‘okay’. Underwhelming for my first PG box…
SSH and Apache running and unfiltered on the box.
Credentials in an HTML comment.
Some interesting finds from gobuster. Trying to brute force with hydra at the same time with the found username and rockyou-35, it is not looking promising.
Found some interesting encoded text in
So this part is dumb; the username we know, and the password is actually the base64 “flag”. I hope this is not indicative of the quality of these machines…
Hopefully privesc is more interesting.
Kernel exploits are okay, I could use the practice even if theres not much to them.
Had to compile on the box, and not on my machine. I need to get smarter on compilation flags and architectures and what not.
I won’t show the root flag. You get the point.