Task 1 Deploy the machine
No answer needed
Task 2 Reconnaissance
Scan the box, how many ports are open?
"6"
What version of the squid proxy is running on the machine?
"3.5.12"
How many ports will nmap scan if the flag -p-400 was used?
"400"
Using the nmap flag -n what will it not resolve?
"DNS"
What is the most likely operating system this machine is running?
"Ubuntu"
What port is the web server running on?
"3333"
Task 3 Locating directories using GoBuster
What is the directory that has an upload form page?
"/internal"
Task 4 Compromise the webserver
Try upload a few file types to the server, what common extension seems to be blocked?
".php"
What extension is allowed?
".phtml"
What is the name of the user who manages the webserver?
"Bill"
What is the user flag?
"8bd7992fbe8a6ad22a63361004cfcedb"
Task 5 Privilege Escalation
On the system, search for all SUID files. What file stands out?
find / -user root -perm -4000 -exec ls -ldb {} \;
"/bin/systemctl"
Become root and get the last flag (/root/root.txt)
When we search for privilege escalation vulnerabilities for Systemctl, SUID, we find the following path.
https://gtfobins.github.io/gtfobins/systemctl/
"a58ff85790a9270368d33a9966c7fd5"