Download the box from here
Discover the machine IP with netdiscover.
Run a nmap scan.
Head to the http site.
Click on the Buscar page on the top right.
Seems like a page we can exploit, (http://192.168.18.4/site/busque.php?buscar=)
Send the page to burpsuite.
Send the page to repeater.
Let’s test out some linux commands.
Use basecode encoding to explore the rest of the directories.
Let’s cat the config.php file found in the wordpress directory.
$username = “desafio02”;
$password = “abygurl69”;
Tried logging in with desafio02 account and password but it was invalid. Tried it again with the jangow01 user and gained access.
Cant find anything on the FTP servers.
Let’s login to the main VM itself.
Download the dirtycow exploit from here
Complile the exploit with : gcc -Wall -o dirtycow-mem dirtycow-mem.c -ldl -lpthread
Head back to the VM chmod +x the exploit and run it.
Root is gained and head to the root folder to find the final flag.