Sunsetnoontide Offsec’s proving ground write-up
As Always and as I frequently explain and document in my write-ups, in every penetration testing engagement we start by information gathering.
in the image shown above we ping target to check if it’s up, what ping command do is send ICMP requests to the target to check if it’s available for communication and further exploitation.
Next we scan the target using our handy tool which is nmap:
I already ran the scan you can check it below:
In the next phase, I looked at the current services and found the right exploit as the image shown below:
The metasploit module seems a good match, after trying it it seems that this exploit isn’t a viable approach!
it seems that the exploit not working through metasploit or maybe requires some modifications, however I stumbled upon this webpage after some googling and gained a foothold successfully!
lets keep going next for privilege escalation, it turns out and after some overthinking trying different methods for privilege escalation the PE Vector was actually simple which was weak root password.
the password for the root user was root.
Thanks for reading my write-up, stay tuned for the next ones!