Post

Sws101_bounty_hackers

Topic: Bounty hacker


alt text

Description

Hello everyone, I hope you all are doing good! In this page we will be learning about the Bounty hacker challenges from Try Hack Me.

Target IP Address

1
10.10.178.115

Enumeration

nmap

First, I have pingged the target IP address and it is up. Then I have used nmap to scan the target IP address.

alt text

There are 3 open ports and they are;

  • 21 ftp vsftpd 3.0.3
  • 22 ssh OpenSSH 7.2p2
  • 80 http Apache httpd 2.4.18

FTP

From the nmap scan I knew that Anonymous login is allowed in this ftp server.

alt text

I have successfully logged into the ftp server using the anonymous login.

Inside the port 21, I have found a file called locks.txt and task.txt. I have downloaded these file using the get command.

I have read the content inside the lock.txt file and found this.

alt text

I have read the content inside the task.txt file and found this.

alt text

In this task.txt file, I have found a hint to find the hidden directory. The file contains a note from someone named Lin.

Then after getting the information I used Lin as a username and tried to brute force the password using hydra. I have used the rockyou.txt file to brute force the password.

alt text

I have successfully found the password RedDr4gonSynd1cat3and able to log into the ssh server.

alt text

Privilege Escalation

Inside the ssh server I have found a file called user.txt and Inside this file I have found the user flag.

alt text

Inorder to find the root flag I used the command sudo -l to find the sudo permissions. I have found that we can run /usr/tar as root.

alt text

I have used this command sudo tar -cf /dev/null /dev/null --checkpoint=1 --checkpoint-action=exec=/bin/sh to get the root shell.

alt text

And finally I was able to find the root flag.

alt text

This post is licensed under CC BY 4.0 by the author.

Trending Tags