Cybersploit: 1 Vulnhub Walkthrough: Penetration Testing Methodology
Cybersploit: 1 Vulnhub Walkthrough: Penetration Testing Methodology
Today we are going to solve another boot2root challenge called “CyberSploit: 1”. It’s
available at Vulnhub for penetration testing. This is an easy level lab. The credit for making
this lab goes to cybersploit1. Let’s get started and learn how to successfully break it down.
Level: Easy
Since these labs are available on the Vulnhub website. Let’s download the lab file from here.
Reconnaissance
Netdiscover
Nmap
Enumeration
Gobuster
Exploiting
Basic Cryptography
CyberChef
Privilege Escalation
Walkthrough
Reconnaissance
netdiscover
1 netdiscover
So, let’s start by listing all the TCP ports with nmap.
We access the web service and review the source code. We find the SSH user name.
It’s time to fuzzing! We used Gobuster and found several files. We examined the robots.txt
and found a base64 text.
Exploiting
We use curl and add “base64 -d” to the command to decode the message in plain text. We get
the first flag, the flag is the user’s password “itsskv“.
We access with the obtained credentials and read the file “flag2.txt“. Inside, we find a new
code, this time it’s “binary code“.
We use the online tool “Cyberchef” and we get the second flag.
Author: David Utón is Penetration Tester and security auditor for Web applications,
perimeter networks, internal and industrial corporate infrastructures, and wireless networks
Contacted on LinkedIn and Twitter.
Share this: