, ,

Cybersploit : 1



  • Enumerate the directories
  • Read the source code of the webpage to get a clue
  • robots.txt gives us a base64 encrypted code
  • Decrypt the code to get the first flag
  • SSH into the user with flag as password
  • Machine runs an outdated Linux kernel
  • Find the exploit Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) – ‘overlayfs’ Local Privilege Escalation
  • Run the exploit to get root access


Run nmap scan to find for open ports.

Port 80

Found a username in the sourcecode.

Run a gobuster scan to find for hidden directories.


An encrypted code.

Use base64 to decrypt the code and the first flag is found.


Let’s try to ssh into the itsskv user with the flag password.

User access gain.

Found the second flag.

The 2nd flag is contains a binary code , decrypt it to get the 2nd flag.

Unable to run sudo permissions.

Check for linux kernel version

The version is outdated and we can search for an exploit.

Privilege escalation

Download the exploit , upload it to the machine and compile it.

Run the exploit and root access is gained.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Comments (



%d bloggers like this: