DC-2 Final
DC-2 Final
PROJECT REPORT
HAREESH K P
[email protected]
CONTENTS
• Introduction
• Active information gathering
• Vulnerability scanning
• Exploitation
• Enumeration and privilege escalation
• Important take away from this lab
INTRODUCTION
To find the 5 flags. These flags are hints for further steps.
The location of these flags is just an indicator where a
good penetration tester should look. An alternative
approach could also be to directly get to root
Penetration methodology
• Discovering Targets IP
• Network scanning (Nmap)
• Adding the Domain name to Host file
• Surfing HTTP service port
• Using WPscan for Username enumeration
• Using cewl for creating wordlist
• Logging into WordPress
• Logging in through SSH
• Escaping restricted shell
• Finding binary in the sudoers list
• Getting root access and reading final flag
Active information gathering
• Host discovery and port scanning
Vulnerability scan
I directly moved on to this step as this is my personal lab
environment. I used nmap to find vulnerabilities in Wordpress
webapp.
So, the first idea that came to us was to run a wpscan on
the webpage and see what the scan enumerates.
The above results gave us some information:
1. File enumeration: /wp-login.php , …. , /readme.html
2. Users Enumeration: admin, tom, jerry
sudo -l
Having the root permission on git was like the cherry on the cake, because
through this I can try to escalate low privilege shell to high privilege shell.