nmap scan: here
21 ==> ftp
22 ==> ssh
80 ==> http
nikto scan at the http.
Nothing Found
gobuster scan:
Nothing interesting found
Checked FTP and tried to search in the exploit-db for the exploit of the version, tried some scripts but didn’t work.
Checked FTP server with Name: anonymous
Logged into the ftp server and found locks.txt
& task.txt
Downloaded the files and found that locks.txt was a username/password file
Used hydra to attck the ssh of the machine
Bruteforcing
.
.
.
.
.
task.txt
and found the username lin
at the end.lin
as user and VOILA got the password as Click Me!
ssh [email protected]
and password as mentioned abovefound the user.txt
#### Privilege Escalation
sudo -l
and found to be /bin/tar
root.txt
from /root/