Bounty Hacker

Task 1: Living up to the title.

Deploy the machine.

No answer needed

Find open ports on the machine

  • There are three open ports:

Port
Service

21

ftp

22

ssh

80

http

No answer needed

Who wrote the task list?

  • Let's got search the IP address using our browser.

  • There's nothing of importance here.

  • Let's login through FTP anonymously.

  • Let's look at the contents of the directory

  • We can download these files to our machine using the get command.

  • Let's read the task.txt file.

Answer

What service can you bruteforce with the text file found?

  • Since we saw that FTP, SSH and HTTP were the services running on the machine it is safe to saw that we can brute force SSH.

Answer

What is the users password?

  • Let's take a look at the locks.txt file

  • Seems to be a bunch of passwords.

  • We can brute force SSH using the hydra utility.

  • So the password for the lin user is RedDr4gonSynd1cat3.

Answer

user.txt

  • Let's login using the credentials we have.

  • After lookin around we can see a user.txt file. Let's cat that file.

Answer

root.txt

  • We can list out the sudo commands that the lin user is able to run using the following command:

  • We can now use GTFOBins to escalate our privilege.

  • We will use the Sudo exploit.

  • We now have root privilege and can cat the root.txt file.

Answer

Last updated

Was this helpful?