This VM Image is beginner friendly machine. The object of the game is to acquire root access via any means possible (except actually hacking the VM server or player). There are more ways then one to successfully complete the challenges.
This is one of the intermediate machine from Offensive Security Proving Grounds!. So let’s dive in as per our goal.
Exporting IP as environment variable and scanned victim’s machine quietly ;-) the results are:
Offensive Security Proving Ground Complete Write-up
Exporting IP of the target machine as environment variable and scanned the target and found open ports and services as:
After switching up to port 80, three users found as martin, hadi, jimmy. COOL!!
This is one of the official machine from Offensive Security Proving Grounds
So starting of by exporting IP as environment variable and starting out with scanning services and open ports and found
Target IP: 192.168.100.133
The intermediate level machine to hack into the Bil Joel Blog.
The goal of this room was :-
>Gaining a shell using a unique vulnerability for a specific Wordpress version
>Getting root privileges using a very creative vulnerability
Initially I scanned for reconnaissance for open ports and services.
The purpose of this machine is to grant OSCP students further develop, strengthen, and practice their methodology for the exam.
So Let’s dive into pwning the machine and gain a root shell
Target I.P → 192.168.230.134 | Attacker’s I.P → 192.168.230.128
For the initials, let’s go for…