Hacker Kayra
  • ๐Ÿ“Introduction Page
  • โญLearning Process
    • ๐Ÿง Learning Mindset
    • ๐Ÿ–‡๏ธLearning Dependencies
    • ๐ŸงฎLearning Process
  • ๐Ÿ” Fundamentals
    • ๐Ÿ›œNetworking Fundamentals
    • ๐ŸงLinux Fundamentals
    • ๐ŸชŸWindows Fundamentals
    • ๐Ÿ•ต๏ธActive Directory
    • ๐Ÿ•ธ๏ธIntroduction to Web Applications
    • ๐Ÿ—ƒ๏ธOther Useful Concepts
      • Regular Expressions (RegEx)
    • Cyber Security Products
      • Lab Setup
      • โœ…Fortigate Firewall
      • MDM Lab
      • IAM Lab
      • PAM Lab
      • DLP Lab
  • ๐ŸงฐTools
    • Nmap
    • Nessus
    • Ffuf
    • Hydra
    • John The Ripper
  • โœ๏ธWrite Ups
    • ๐Ÿ—ƒ๏ธHack The Box Machines
      • ๐ŸงLinux
        • Code
    • ๐Ÿ—ƒ๏ธProving Grounds Boxes
      • ๐ŸงLinux
        • Stapler
        • eLection
        • Loly
        • Blogger
        • Potato
        • Amaterasu
        • Exfiltrated
        • Pelican
        • Astronaut
        • Cockpit
        • Levram
        • Extplorer
        • LaVita
        • pc
        • Scrutiny
        • Zipper
        • Flu
        • Twiggy
        • Codo
        • Crane
        • Hub
        • BlackGate
        • Boolean
        • ClamAV
        • PayDay
        • Snookums
        • Bratarina
        • Nibbles
      • ๐ŸชŸWindows
        • Algernon
        • AuthBy
        • Craft
        • Kevin
        • Squid
        • Jacko
        • DVR4
        • Hepet
        • Shenzi
        • Nickel
        • Slort
        • MedJed
        • Active Directory
          • Access
          • Vault
    • ๐ŸชชCertificates
      • Certified Professional Penetration Tester (eCPPTv3)
      • Web Application Penetration Tester eXtreme (eWPTXv3)
    • ๐ŸšฉCTF Events
      • Cyber Hub 2025 CTF
  • ๐Ÿ“šStudy Notes
    • Penetration Tester (HTB CPTS)
      • Penetration Testing Process
      • Reconnaissance, Enumeration & Attack Planning
        • Network Enumeration with Nmap (Continue Here)
        • Footprinting (Just Do Formatting)
        • Vulnerability Scanning (Check)
        • File Transfers
        • Using the Metasploit Framework
        • Web Information Gathering
        • Shells & Payloads
      • Exploitation & Lateral Movement
        • Attacking Common Services (Just Do Formatting)
        • Password Attacks
        • Active Directory Enumeration & Attacks (TBC)
        • Pivoting, Tunneling, and Port Forwarding
      • Web Exploitation
        • Using Web Proxies (Check)
        • Attacking Web Applications With Ffuf (Check)
        • Login Bruteforcing
        • Cross-Site Scripting (XSS)
        • Command Injection
        • SQL Injection
        • File Upload Attacks
        • File Inclusion
        • Web Attacks (Check)
        • Attacking Common Applications (Check)
      • Post-Exploitation
        • Linux Privilege Escalation
        • Windows Privilege Escalation (TBC)
      • Documentation & Reporting
  • ๐Ÿง‘โ€๐Ÿ’ปOther
    • Leet Code
      • Quick Guide: Big-O Notation
      • Problem 01 - Two Sum
    • Data Structure & Algorithms (DSA)
  • ๐Ÿ—„๏ธArchive/Backup/Bin
    • Sysmon Usecases (IBM)
    • ๐ŸงLinux Fundamentals (TryHackMe)
      • Introduction
      • Basic Commands
      • Wildcards & Operators
      • Permissions
      • Common Directories
      • Terminal Text Editors
      • General/Useful Utilities
    • ๐ŸชŸWindows Fundamentals (TryHackMe)
      • Introduction
      • The File System
      • User Accounts
      • Settings & Control Panel & Task Manager
      • System Configuration
    • Active Directory (TryHackMe)
      • Breaching Active Directory
    • FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics
      • Book 2 - Intrusion Analysis
        • Credential Theft
        • Event Log Analysis for Responders and Hunters
    • Certified Threat Hunting Professional (eCTHPv2)
      • Threat Hunting: Hunting the Endpoint & Endpoint Analysis
        • Event IDs, Logging, & SIEMs
    • OSCP
      • Report Writing
      • โœ…Passive Information Gathering
      • โœ…Active Information Gathering
      • โœ…Vulnerability Scanning
      • Introduction to Web Application Attacks
      • Common Web Application Attacks
        • โœ…Cross-Site Scripting (XSS)
        • โœ…Directory Traversal
        • โœ…File Inclusion
        • โœ…File Upload Vulnerabilities
        • Command Injection
        • SQL Injection Attacks
        • Client Side Attacks
      • โœ…Locating Public Exploits
      • โœ…Exploiting Walkthrough
      • Fixing Exploits
      • โœ…Antivirus Evasion
      • Password Attacks
      • Windows Privilege Escalation
      • Linux Privilege Escalation
      • Port Redirection and SSH Tunneling
      • Tunneling Through Deep Packet Inspection
      • The Metasploit Framework
      • Active Directory Introduction & Enumeration
      • Attacking Active Directory Authentication
      • Lateral Movement in Active Directory
      • Assembling the Pieces
      • Other General Information
    • โšกPort Swigger (Web Penetration Testing)
      • โœ…Information Disclosure
      • โœ…Path Traversal (Directory Traversal)
      • โœ…OS Command Injection
      • Business Logic Vulnerabilities
      • โœ…Authentication
      • โœ…Access Control
    • Certified Bug Bounty Hunter (CBBH)
      • Web Requests
        • HTTP Fundamentals
    • Getting Started
      • Introduction
      • Pentesting Basics
    • Certified Penetration Testing Specialist (CPTS)
      • Introduction
        • โœ…Penetration Testing Process
          • Penetration Testing Overview
          • Laws & Regulations
          • Penetration Testing Process
          • Pre-Engagement
          • Information Gathering
          • Vulnerability Assessment
          • Exploitation
          • Post-Exploitation
          • Lateral Movement
          • Proof-of-Concept
          • Post-Engagement
          • Practice
          • Academy Module Layout
        • Getting Started with Hack The Box (HTB)
      • Reconnaissance, Enumeration & Attack Planning
        • โœ…Network Enumeration with Nmap
          • Enumeration & Introduction to Nmap
          • Host Discovery
          • Host and Port Scanning
          • Saving The Results
          • Service Enumeration
          • Nmap Scripting Engine
          • Scanning Performance
          • Firewall and IDS/IPS Evasion
        • Footprinting
        • โœ…Information Gathering - Web Edition
          • Introduction
          • Passive Information Gathering
          • Active Information Gathering
        • Vulnerability Assessment
        • File Transfers
        • Shells & Payloads
        • Using the Metasploit Framework
      • Exploitation & Lateral Movement
        • Password Attacks
        • Attacking Common Services
        • Pivoting, Tunneling, and Port Forwarding
        • Active Directory Enumeration & Attacks
      • Web Exploitation
        • Using Web Proxies
        • โœ…Attacking Web Applications with Ffuf
        • โœ…Login Brute Forcing
        • SQL Injection Fundamentals
        • SQLMap Essentials
        • Cross-Site Scripting (XSS)
        • File Inclusion
        • File Upload Attacks
        • Command Injections
        • Web Attacks
        • Attacking Common Applications
      • Post-Exploitation
        • Linux Privilege Escalation
        • Windows Privilege Escalation
      • Reporting & Capstone
        • Documentation & Reporting
        • Attacking Enterprise Networks
    • Old Active Directory
    • Tib3rius Privilege Escalation
      • Linux Privilege Escalation
    • HTB Archived Write-Ups (Check)
      • Irked
      • Nibbles
      • Brainfuck
      • Lame (Check)
    • ๐Ÿ“‹Cheat Sheets
      • Penetration Testing Cheat Sheet (In Progress)
Powered by GitBook
On this page
  • Enumeration & Reconnaissance
  • Service Analysis
  • Gaining Initial Access
  • Privilege Escalation
  • Lessons Learned
  1. Write Ups
  2. Proving Grounds Boxes
  3. Linux

Flu

PreviousZipperNextTwiggy

Last updated 2 months ago

Source: Proving Grounds OS: Linux Community Rating: Intermediate

Enumeration & Reconnaissance

  • I started with the usual autorecon and discovered three open ports on the target:

    • SSH (22)

    • HTTP (8090)

    • HTTP (8091)

Service Analysis

  • I began my analysis on port 8090, where I found a login page. I tried a few credentials but nothing worked. After some online digging, I found CVE-2022-26134, which offers code execution.

Gaining Initial Access

  • The first PoC I tried granted code execution, but my reverse shell attempt failed. I then tested two more PoCs, the second didnโ€™t work either, but the final one succeeded after I had to change the default listening port, as if OffSec wanted to make things a bit trickier.

  • Once code execution was achieved, I secured my foothold on the system.

Privilege Escalation

  • After gaining access, I ran linpeas.sh, but it didnโ€™t reveal any obvious privilege escalation vectors.

  • Running pspy, I noticed that root was executing a log-backup.sh script, a script to which I had write access. I leveraged this script to spawn a reverse shell, which worked perfectly.

Lessons Learned

  • Persistence with multiple PoCs can pay off when the first attempt fails.

  • Tools like pspy can uncover hidden escalation paths that arenโ€™t found using linpeas.

โœ๏ธ
๐Ÿ—ƒ๏ธ
๐Ÿง
The Login Page
Initial Access
Pspy Output
Root Access