TOPPO: 1 VulnHub Walkthrough

Introduction ????????

In this post, You will learn how to CTF the TOPPO 1 box from vulnhub and below is the video format of the post, Check that also ????

Video ????

TOPPO Hacking Phases

  • Network scanning
  • Directory brute-force attack
  • Abusing HTTP web directories
  • Compromise confidential
  • Spawn tty shell (ssh login)
  • SUID privilege escalation
  • Get root access and capture the flag

Let’s start

Hey you ❤️ Please check out my other posts, You will be amazed and support me by following on youtube.

https://www.youtube.com/@techyrick-/videos

Finding Target IP

To find the target IP lets use the below command or you can go with the net discover command.

sudo arp-scan -l

My target IP is 192.168.65.32 and after finding the target IP I started to do for an nmap scan.

Nmap

Let’s do a full port scan and check for version and OS.

nmap -p- -A 192.168.65.32

We can see from the scan report three ports are open, Port 22, Port 80 and Port 111, Port 41092

Enumeration

Let’s view the target site.

Unfortunately I didn’t find any thing interesting in the home page. Then I just ran a directory enumeration and found some of the information.

Finally we have found a hint and it seems interesting. I have found an admin directory where I have found a note called password. Here is how it looks

Since the port 22 is open let’s try to login via ssh

Advertisement

Exploitation

Since from the note we have got a password let’s use the username from the password.

username: ted
password: 12345ted123

We have got the connection lets elevate the privilege.

By using the below command we can enumerate all the binary having SUID permission.

find / -perm -u=s -type f 2>/dev/null

Using a Python one-liner, you can complete the identical process and spawn the root shell.

python2.7 -c 'import pty;pty.spawn("/bin/sh")' 
whoami 
cat /root/flag.txt

Conclusion

According to me it’s and easy box. Out of 10 I will give a solid 1.5 out of 10 ????. Hope you enjoyed the writeup. See you guys in the next post ❤️


Share your love