Flags: 3 (local.txt, user.txt & root.txt) Difficulty Level: Initial Shell (Easy) - Privileges Escalation (Intermediate) Website: https://ebryx.com Hint: Maybe, you hasted and left some open holes unchecked? Literally Vulnerable is supposed to give beginners a taste of real-world scenarios and OSCP machines at the same time! It was inspired highly by the @DC series.
You're supposed to know the big three (EEEs) Enumeration, Exploitation & Escalation of pentesting to pwn the machine. The machine is supposed to be beginner-friendly and the difficulty level is Easy-Intermediate depending on your knowledge. You need to have enough information about Linux file types & permissions for privileges escalation.
Technical Information: Just download, extract and load the .vmx file in VMware Workstation (tested on VMware Workstation 15.x.x) The adapter is currently NAT, networking is configured for DHCP and IP will get assigned automatically Contact: You can either contact me on twitter @syed__umar or linkedin (/in/syedumararfeen/) for hints! There are three flags in the machine: local.txt, user.txt & root.txt. You're supposed to grab all three in order to completely pwn the machine. Hope you like the machine, best of luck! :)
I'll try my best to continue with the series! -------- From : https://www.vulnhub.com/entry/ua-literally-vulnerable,407/
PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 3.0.3 22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0) 80/tcp open http nginx 1.14.0 (Ubuntu)
PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 3.0.3 | ftp-anon: Anonymous FTP login allowed (FTP code 230) |_-rw-r--r-- 1 ftp ftp 325 Dec 04 13:05 backupPasswords | ftp-syst: | STAT: | FTP server status: | Connected to ::ffff:172.16.252.129 | Logged in as ftp | TYPE: ASCII | No session bandwidth limit | Session timeout in seconds is 300 | Control connection is plain text | Data connections will be plain text | At session startup, client count was 1 | vsFTPd 3.0.3 - secure, fast, stable |_End of status 22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 2048 2f:26:5b:e6:ae:9a:c0:26:76:26:24:00:a7:37:e6:c1 (RSA) | 256 79:c0:12:33:d6:6d:9a:bd:1f:11:aa:1c:39:1e:b8:95 (ECDSA) |_ 256 83:27:d3:79:d0:8b:6a:2a:23:57:5b:3c:d7:b4:e5:60 (ED25519) 80/tcp open http nginx 1.14.0 (Ubuntu) |_http-generator: WordPress 5.3 |_http-server-header: nginx/1.14.0 (Ubuntu) |_http-title: Not so Vulnerable – Just another WordPress site |_http-trane-info: Problem with XML parsing of /evox/about 65535/tcp open http |_http-server-header: Apache/2.4.29 (Ubuntu) |_http-title: Apache2 Ubuntu Default Page: It works
80/tcp open http nginx 1.14.0 (Ubuntu) |_http-generator: WordPress 5.3 |_http-server-header: nginx/1.14.0 (Ubuntu) |_http-title: Not so Vulnerable – Just another WordPress site |_http-trane-info: Problem with XML parsing of /evox/about 65535/tcp open http |_http-server-header: Apache/2.4.29 (Ubuntu) |_http-title: Apache2 Ubuntu Default Page: It works
sudopasswd root Sorry, user john is not allowed to execute '/usr/bin/passwd root' as root on literallyvulnerable.
1 2 3 4 5 6 7
sudo -l
Matching Defaults entries forjohn on literallyvulnerable: env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/ sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin User john may run the following commands on literallyvulnerable: (root) /var/www/html/test.html
可以运行 /var/www/html/test.html
权限提升(root)
/var/www/html 目录下没有 test.html 文件,且 john 没有 html 目录的写权限,那就切换回 www-data 用户创建文件