Bulldog 1 ctf Walkthrough
Bulldog 1 Walkthrough
The name of the Virtual machine is “Bulldog 1” that we are going to crack. It is a Boot2Root VM that we are going to solve. This is a web-based VM. Our main goal is to escalate the privileges to root and capture the flag.
You can download it from a
https://www.vulnhub.com/entry/bulldog-1,211/
Penetration Methodology:
1. Network Scanning (Nmap, netdiscover).
2. Directory Brute-force (dirbuster).
3. Decrypt the data using www.crackstation.net
4. Finding vulnerabilities in dev page.
5. Get into the shell for privilege escalation.
6. Switch user (su) and submit the stolen password.
7. Take root access and capture t
First we have to find out the open ports using namp command.
Command used: nmap -A 192.168.0.5 or arp-scan -l
It gives the ip addresses of machines presented in your system.
It gives the ip addresses of machines presented in your system.
In above we found some open ports are open ssh and http .
In this we found that a wgi server was running so we entered ip address in website
Then I dig further this machine using dirb command then I found there is an a admin login page, robots.txt and web shell in the website .
Command used: dirb http://192.168.0.5
So I tried to open the robots.txt, Admin login and dev .
Then I decided to inspect elements http://192.168.0.5/dev then I found some hashes with email ids . so I decided to de hash those hashes.
The I copied these hashes and paste in the https://crackstation.net/
So I found two hashes values usernames are nick and sarah so I have tried to login in admin page using this creditianls. Then I got access the admin page but I didn’t get full privileges so I went to the dev page then I found a webshell.
Then I go to the dev and I found webshell and opened it displays like some terminal in Linux system and in it below it has only worked by few commands as listed below so I decided try the the commands to do the enumeration.
The I copied these hashes and paste in the https://crackstation.net/
So I found two hashes values usernames are nick and sarah so I have tried to login in admin page using this creditianls. Then I got access the admin page but I didn’t get full privileges so I went to the dev page then I found a webshell.
Then I go to the dev and I found webshell and opened it displays like some terminal in Linux system and in it below it has only worked by few commands as listed below so I decided try the the commands to do the enumeration.
run some commands to enumerate the data .
Commands used:
ls
ls & date
After sometime I found a some important information
Command used: Cat /etc/password
In above picture I found django as a user name. Then I searched for a password .
Command used: ls && strings /home/bulldogadmin/.hiddenadmindirectory/customPermissionApp
Then I found some thing while observing 2,3,4,5 last lines of the above image and I decoded it and I found the password was SUPERultimatePASSWORDyouCANTget
Then I tried to login using ssh in kali using open port 23 which I got from the nmap scan.
Then also I am not accessing some files. So I decided to change the root so I gave “sudo su -”
Comments
Post a Comment