Included

Initial Scan

sudo nmap -T4 -v 10.129.253.54 -oA Included-Basic
sudo nmap -T4 -sU -v 10.129.253.54 -oA Included-Basic-UDP
sudo nmap -T4 -p 80 -sC -sV -v 10.129.253.54 -oA Included-80

Task 1

What service is running on the target machine over UDP?

Answer: tftp

Task 2

What class of vulnerability is the webpage that is hosted on port 80 vulnerable to? Looking on OWASP we ca test for local file inclusion. So we can curl the website. curl 'http://10.129.253.54/?file=/etc/passwd'

Answer: Local File Inclusion

Task 3

What is the default system folder that TFTP uses to store files?

Answer: /var/lib/tftpboot/

Task 4

Which interesting file is located in the web server folder and can be used for Lateral Movement?

Answer: .htpasswd

Task 5

What is the group that user Mike is a part of and can be exploited for Privilege Escalation? This article on HackTricks shows ways we can exploit LXD. Answer: lxd

Task 6

When using an image to exploit a system via containers, we look for a very small distribution. Our favorite for this task is named after mountains. What is that distribution name?

Answer: alpine

Task 7

What flag do we set to the container so that it has root privileges on the host system?

Answer: security.privileged=true

Task 8

If the root filesystem is mounted at /mnt in the container, where can the root flag be found on the container after the host system is mounted?

Answer: /mnt/root

Task 9

Submit user flag

using this PHP Reverse Shell(First result on Google when doing this).

Put the shell.php onto the server

Run the .php fle from LFI

Upgrade the shell

Look at the passwd file and login as mike. mike:Sheffield19

Answer: a56ef91d70cfbf2cdb8f454c006935a1

Task 10

Submit root flag

Answer: c693d9c7499d9f572ee375d4c14c7bcf

Last updated