Vulnhub Dina: 1.0.1 Walkthrough
- by Vince
-
in Blog
-
Hits: 3216
In the realm of vulnerable boxes, I prefer the more realistic situations rather than the style that leans toward capture the flag. I get it. When a person creates a vulnerable machine, it takes time and creativity and for that, I tip my hat to you. Thank you for creating boxes! All of you! This one, however, leans toward the CTF style -- fortunately, it's not difficult and I rooted it quickly. It was clever, I got to play around with a new application, and when I'm done with this post, I'm going back for a manual exploit on the same vuln.
Starting off with Nmap:
Not too many options -- let's poke it with Nikto:
Some directories to poke, first, let's hit the default:
I pull up Burp and submit but I'll come back to that if need be. Let's check out those subs:
As I check out each page, I make sure there's nothing hiding:
Something WAS hiding! I'll save those for later. Continuing with the subs:
Let's save this for further inspection:
Let's unzip it:
We get prompted for a password but I go to our handy list of passwords from earlier and:
Honestly, I didn't even listen to it. Hitting it with strings:
More messages and a new URL, let's check that out and keep our list of passwords handy:
We get prompted, use our creds and:
I'm in! I poke around but I want to see if there's something in Metasploit that can get us to our next step:
Couple of choices, I setup options:
Exploit:
We're in! You KNOW where I'm going:
Since we don't have SSH, we can only hope the box will stay up long enough for us to execute the unstable fix -- which is the case. We su to firefart, hit it with the unstable for... #rootdance. Let's see what's in the flag: