Jordaninfosec-CTF01 walk through

In this article we will solve another boot2root challenge.This machine is designed for beginners.we can download this machine from vulnhub.


First step is to find the IP address of the target and for that we used the command : netdiscover -i wlan0

Now we scan the target to check open ports,command used : nmap -p-

As we can see that there are only 2 ports open and these are : 22(SSH) and 80(HTTP) So we decided to browse HTTP service by opening our browser.

here we found a login form. Now we decided to find hidden directories and files using the dirb tool,command used : dirb

So we found that these 3 directories might be useful for us,So first of all we decided to visit /flag

Ok we have our first flag!

Now we change our directory to /admin_area and after visiting this webpage we see a message ,not that much useful but source code found to be useful.

So we used these credentials to login into the form we found earlier and yes we succeed in login.

So we decided to upload an image and yes we get a success message!

So we decide to upload a php file to get a reverse shell! but to execute that file we go to /uploaded_files/name_of_file.php , In our Kali Linux machine we started metasploit to get a session ,and yes we got a session . Now by typing shell we get a get a shell and by using python one-liner we get a stable shell.

Now by typing ls we find one more file hint.txt

So the hint is : we need to find the password of the user "technawi" which is present in a hidden file so we decided to run the command : find / -user technawi -type f 2>&1 | grep -v "Permission " | grep -v "No such"

Yes,we found a file. now we go to this directory and try to read the content of the file using cat command.

Now we type in su technawi and use the password : 3vilH@ksor

Now we decided to read flag.txt file present in the directory /var/www/html/

Now we type in sudo -l to check for the permission for the user technawi

This user has all the privileges so by using sudo su we get the root access and we change the root password by using the command : passwd root

As we are root now , So challenge is completed!!

Recent Posts

See All

Website change notice

As you all know that our website is providing walkthrough of different challenges from different platforms and without any advertisement but due to some funds issue we can't continue this website :( S

Subscribe to HacLabs newsletter

Get priority notification on the release of the latest articles.

  • YouTube
  • Twitter
  • Instagram
  • Linkedin

© 2020 by HacLabs.