CyberSploit2 CTF — Vulnhub walkthrough
In this guide I’ll go over the steps to get root access in this VM.
You can download the VM from: https://www.vulnhub.com/entry/cybersploit-2,511/
Once it’s running in VirtualBox, I run the usual netdiscover to get the IP address of the machine:
After that a quick NMAP will reveal that it has SSH and HTTP open:
The website on port 80 is just a leaderboard:
The page’s source code hint’s “ROT47”:
We google a bit for an online rot47 encoder/decoder:
And we get:
Now that I have two values, I’ll try to use them for SSH:
The home folder has a file called hint.txt with the message “docker”
Docker IS running in the server:
Because the current user is in the “docker” group, it can run without sudoer permissions, this allows us to escalate privileges:
I’ll run the base docker image, mounting the root folder of the host as a folder in the container, then chroot to it, this will end up containerizing the host system but with root permissions:
docker run -v /:/mnt --rm -it alpine chroot /mnt bash
And now that we are root we can move freely:
And that is all for this short challenge!