Included
Initial Scan
sudo nmap -T4 -v 10.129.253.54 -oA Included-Basic
sudo nmap -T4 -sU -v 10.129.253.54 -oA Included-Basic-UDP
sudo nmap -T4 -p 80 -sC -sV -v 10.129.253.54 -oA Included-80


Task 1
What service is running on the target machine over UDP?
Answer: tftp
Task 2
What class of vulnerability is the webpage that is hosted on port 80 vulnerable to? Looking on OWASP we ca test for local file inclusion. So we can curl the website. curl 'http://10.129.253.54/?file=/etc/passwd'

Answer: Local File Inclusion
Task 3
What is the default system folder that TFTP uses to store files?
Answer: /var/lib/tftpboot/
Task 4
Which interesting file is located in the web server folder and can be used for Lateral Movement?

Answer: .htpasswd
Task 5
What is the group that user Mike is a part of and can be exploited for Privilege Escalation? This article on HackTricks shows ways we can exploit LXD. Answer: lxd
Task 6
When using an image to exploit a system via containers, we look for a very small distribution. Our favorite for this task is named after mountains. What is that distribution name?

Answer: alpine
Task 7
What flag do we set to the container so that it has root privileges on the host system?
Answer: security.privileged=true
Task 8
If the root filesystem is mounted at /mnt in the container, where can the root flag be found on the container after the host system is mounted?
Answer: /mnt/root
Task 9
Submit user flag
using this PHP Reverse Shell(First result on Google when doing this).
Put the shell.php onto the server
Run the .php fle from LFI
Upgrade the shell
Look at the passwd file and login as mike. mike:Sheffield19

Answer: a56ef91d70cfbf2cdb8f454c006935a1
Task 10
Submit root flag

Answer: c693d9c7499d9f572ee375d4c14c7bcf
Last updated