Reading Time: 2 min read
Start 20:24 07-05-2025
Scope:192.168.184.16sudo nmap -sC -sV extplorer -sT -T5 --min-rate=5000 -Pn -vvvv -p-
PORT STATE SERVICE REASON VERSION22/tcp open ssh syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.0)80/tcp open http syn-ack Apache httpd 2.4.41 ((Ubuntu))| http-methods:|_ Supported Methods: GET HEAD POST OPTIONS|_http-server-header: Apache/2.4.41 (Ubuntu)Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel80/TCP - HTTP
Section titled “80/TCP - HTTP”I head on over and get routed to the following URL right away.


Not too sure whether this is supposed to be exposed…or whether we can exploit it 🤔
I looked it up and found a juicy Bug Bounty WriteUp about this exact topic, let’s see if we can follow along:

This walkthrough was a bust as I was not able to create a sql account on the linked website, neither did simple testing pass this page:


So instead I launched feroxbuster and started enumerating.
Feroxbuster
Section titled “Feroxbuster”
I tried out this endpoint instead:

Cool we get a login page!

Nice, simple admin - admin, let’s try it out.

We get in and I notice 2 users:

I went ahead and changed dora to Admin status as well, who knows if anything good will come from it.
Let’s try to find some sort of exploit:

I was able to upload a webshell


EZ PZ
Foothold
Section titled “Foothold”Shell as www-data
Section titled “Shell as www-data”From here I just had to send myself a reverse shell:


I used the upload feature on penelope to upload linpeas.sh and other stuff to enhance my exploitation:

I found that dora is part of the disk group.

This file looks rather interesting?
I went on and viewed it via the website just because I still had access:

Turns out there’s a hash hidden in here.
Hash cracking time
Section titled “Hash cracking time”
Let’s crack this shit:

EZ PZ
Shell as dora
Section titled “Shell as dora”
local.txt
Section titled “local.txt”
Privilege Escalation
Section titled “Privilege Escalation”Exploiting disk group privs
Section titled “Exploiting disk group privs”From my enum I had already found that dora is part of the disk group, let’s find out how we can exploit this.
I found a handy guide for this:

proof.txt
Section titled “proof.txt”Following this principle I got proof.txt super easily:

But seeing as we actually need root access to pass the exam we will have to escalate privileges somehow.
Post-Exploitation
Section titled “Post-Exploitation”The actual intended route to getting root is as follows:

We get the root hash, time to crack it and escalate privs.


Finished 21:15 07-05-2025