<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>ssh &amp;mdash; drsh0&#39;s llog</title>
    <link>https://drsh0.writeas.com/tag:ssh</link>
    <description>my learning log; notes on cybersec activities, ctfs, and ill-equipped cyber adventures. Consume responsibly.</description>
    <pubDate>Sun, 26 Apr 2026 19:34:17 +0000</pubDate>
    <image>
      <url>https://i.snap.as/v7Oo2ci6.png</url>
      <title>ssh &amp;mdash; drsh0&#39;s llog</title>
      <link>https://drsh0.writeas.com/tag:ssh</link>
    </image>
    <item>
      <title>Vulnhub - Funbox Rookie</title>
      <link>https://drsh0.writeas.com/vulnhub-funbox-rookie?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[URI: https://www.vulnhub.com/entry/funbox-2-rockie,520/&#xA;Difficulty: Easy&#xA;&#xA;  Boot2Root ! This can be a real life scenario if rockies becomes admins. Easy going in round about 15 mins. Bit more, if you are find and stuck in the rabbit-hole first.&#xA;&#xA;!--more--&#xA;&#xA;enumeration&#xA;&#xA;nmap&#xA;find anon ftp access&#xA;get all zip files - they contain idrsa keys but are password protected&#xA;&#xA;initial access&#xA;&#xA;use /usr/sbin/zip2john to get hashes of all zip files&#xA;use john to crack these hashes using your favourite wordlist&#xA;user tom&#39;s zip file could be successfully cracked&#xA;extract idrsa with password&#xA;chmod 600 idrsa &amp;&amp; ssh -i idrsa $VulnHubIP -v&#xA;we&#39;re in 🔓&#xA;grab local.txt&#xA;&#xA;privesc&#xA;&#xA;sudo -l - prompted for tom&#39;s password which we don&#39;t have yet&#xA;check all files in directory ls -la&#xA;investigate .bashhistory and .mysqlhistory&#xA;looks like we see a password in mysql history&#xA;we have excessive sudo privileges&#xA;sudo su -l and grab proof.txt 🔚&#xA;&#xA;#vulnhub #ssh #sudo]]&gt;</description>
      <content:encoded><![CDATA[<p>URI: <a href="https://www.vulnhub.com/entry/funbox-2-rockie,520/" rel="nofollow">https://www.vulnhub.com/entry/funbox-2-rockie,520/</a>
Difficulty: Easy</p>

<blockquote><p>Boot2Root ! This can be a real life scenario if rockies becomes admins. Easy going in round about 15 mins. Bit more, if you are find and stuck in the rabbit-hole first.</p></blockquote>



<h2 id="enumeration" id="enumeration">enumeration</h2>
<ul><li>nmap</li>
<li>find anon ftp access</li>
<li>get all zip files – they contain <code>id_rsa</code> keys but are password protected</li></ul>

<h2 id="initial-access" id="initial-access">initial access</h2>
<ul><li>use <code>/usr/sbin/zip2john</code> to get hashes of all zip files</li>
<li>use <code>john</code> to crack these hashes using your favourite wordlist</li>
<li>user <strong>tom</strong>&#39;s zip file could be successfully cracked</li>
<li>extract <code>id_rsa</code> with password</li>
<li><code>chmod 600 id_rsa &amp;&amp; ssh -i id_rsa $VulnHubIP -v</code></li>
<li>we&#39;re in 🔓</li>
<li>grab <code>local.txt</code></li></ul>

<h2 id="privesc" id="privesc">privesc</h2>
<ul><li><code>sudo -l</code> – prompted for tom&#39;s password which we don&#39;t have yet</li>
<li>check all files in directory <code>ls -la</code></li>
<li>investigate <code>.bash_history</code> and <code>.mysql_history</code></li>
<li>looks like we see a password in mysql history</li>
<li>we have excessive sudo privileges</li>
<li><strong><code>sudo su -l</code> and grab <code>proof.txt</code> 🔚</strong></li></ul>

<p><a href="https://drsh0.writeas.com/tag:vulnhub" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">vulnhub</span></a> <a href="https://drsh0.writeas.com/tag:ssh" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">ssh</span></a> <a href="https://drsh0.writeas.com/tag:sudo" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">sudo</span></a></p>
]]></content:encoded>
      <guid>https://drsh0.writeas.com/vulnhub-funbox-rookie</guid>
      <pubDate>Thu, 10 Dec 2020 07:48:25 +0000</pubDate>
    </item>
  </channel>
</rss>