Enumeration

Nmap

Initial nmap scan revealed HTTP and SSH ports were open.

00 - nmap

Web Enumeration

Website only showed a PNG file.

01 - web

I applied directory brute forcing and only one endpoint was available.

02 - dirbuster

That endpoint showed 3 additional endpoints inside it.

03 - web

04 - curl

Then visited those endpoints. It was useless, some story about character I do not even know named Gaara.

05 -useless

Exploitation

However, the name gaara is mentioned too much even machine’s name is gaara. So I brute forced SSH login using gaara as username. And I found a valid password. Logged in and got the user flag.

06 - brute

Privilege Escalation

There were 2 non-common SUID bit privileges: GDB and GIMP. I tried gimp at first but it did not work. Then tried gdb and it worked. I simply copied gtfobins SUID privilege escalation for gdb and got the root flag.

07 - gimp

08 - root


<
Previous Post
Vegeta1 - Proving Grounds Play
>
Next Post
SoSimple - Proving Grounds Play