RootMe
Last updated
Last updated
Reconnaissance
nmap
Enumeration
Directory enumeration using gobuster
Exploitation *
Privilege Escalation
/usr/bin/python
Capturing the flag
user.txt
root.txt
From the nmap scanning. I found that 2 port open. Which is
22 (ssh)
80 (http)
I browse the given IP address.
But, there is nothing interesting. So, I decide to enumerate the directory. By using gobuster.
list all directory or file
Open the directory (http://10.10.231.227/p****/)
Seems like we can upload a file.
Upload reverseshell and run a listener
Cannot upload php file. Lets try change to php5 or php4.
Okay success.
Click and we will get into system.
/usr/bin/python
CONGRATULATIONS!!
This was a fun machine. Very basic yet fun to root. Good for beginner.
Thank you for reading. :)
By AdaniKamal