Vulnversity
Reconnaissance
Scan the box, how many ports are open?
nmap <MACHINE_IP> Starting Nmap 7.91 ( https://nmap.org ) at 2021-01-06 12:58 IST Nmap scan report for <MACHINE_IP> Host is up (0.21s latency). Not shown: 994 closed ports PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 139/tcp open netbios-ssn 445/tcp open microsoft-ds 3128/tcp open squid-http 3333/tcp open dec-notes Nmap done: 1 IP address (1 host up) scanned in 3.24 seconds
What version of the squid proxy is running on the machine?
How many ports will nmap scan if the flag -p-400 was used?
Using the nmap flag -n what will it not resolve?
What is the most likely operating system this machine is running?
What port is the web server running on?
Locating Directories using GoBuster
GoBuster flag
Description
What is the directory that has an upload form page?
Compromise the web server
Try upload a few file types to the server, what common extension seems to be blocked?
Run this attack, what extension is allowed?
Reverse shell
What is the name of the user who manages the webserver?
What is the user flag?
Privilege Escalation
On the system, search for all SUID files. What file stands out?
Become root and get the last flag (/root/root.txt)
Last updated
