Bounty Hacker
Task 1: Living up to the title.
Deploy the machine.

No answer needed
Find open ports on the machine
There are three open ports:
21
ftp
22
ssh
80
http
No answer needed
Who wrote the task list?
Let's got search the IP address using our browser.

There's nothing of importance here.
Let's login through FTP anonymously.
Let's look at the contents of the directory
We can download these files to our machine using the
getcommand.
Let's read the
task.txtfile.
Answer
What service can you bruteforce with the text file found?
Since we saw that FTP, SSH and HTTP were the services running on the machine it is safe to saw that we can brute force SSH.
Answer
What is the users password?
Let's take a look at the
locks.txtfile
Seems to be a bunch of passwords.
We can brute force SSH using the
hydrautility.
So the password for the
linuser isRedDr4gonSynd1cat3.
Answer
user.txt
Let's login using the credentials we have.
After lookin around we can see a
user.txtfile. Let'scatthat file.
Answer
root.txt
We can list out the
sudocommands that thelinuser is able to run using the following command:
We can now use GTFOBins to escalate our privilege.

We will use the
Sudoexploit.
We now have root privilege and can cat the
root.txtfile.
Answer
Last updated
Was this helpful?