Hack the ch4inrulz: 1.0.1 (CTF Challenge)
Hello readers and welcome to another CTF challenge. This VM is made by Frank Tope as you’ll see in the very homepage on the server’s website (his resume). Nice touch, if I might add. Anyhow, you can download this VM from vulnhub here. The aim of this lab is to get root and read the congratulatory message written in the flag.
I would rate the difficulty level of this lab to be intermediate. Although, there were no buffer overflows or unnecessary exploit development, yet it did make us think a little.
Steps Involved:
- Port Scanning and IP clutching.
- Directory busting port 80.
- Directory busting port 8011.
- Discovering LFI vulnerability.
- Discovering an HTML backup file.
- Cracking password hash
- Logging in /development
- Uploading a PHP shell disguised as GIF file.
- Bypassing the check and triggering the file to get a netcat shell.
- Privilege escalation to get flag.
Alright then, let’s head into the VM all the way in.
Full Article Read Here