RootMe

Penetration Testing Methodology
Reconnaissance
nmap
Enumeration
Directory enumeration using gobuster
Exploitation *
Privilege Escalation
/usr/bin/python
Capturing the flag
user.txt
root.txt
Walkthrough

From the nmap scanning. I found that 2 port open. Which is
22 (ssh)
80 (http)
I browse the given IP address.

But, there is nothing interesting. So, I decide to enumerate the directory. By using gobuster.
list all directory or file

Open the directory (http://10.10.231.227/p****/)
Seems like we can upload a file.
Upload reverseshell and run a listener

Cannot upload php file. Lets try change to php5 or php4.

Okay success.

Click and we will get into system.
Privilege Escalation
/usr/bin/python
CONGRATULATIONS!!
This was a fun machine. Very basic yet fun to root. Good for beginner.
Thank you for reading. :)
By AdaniKamal
Last updated