Uvalde
Writeup HackMyVM
In this walkthrough, I demonstrate how I obtained complete ownership of Uvalde from HackMyVM, A beginner friendly Linux Machine VM Link

Enumeration
>> Find the IP address of our Target in our virtual network, with netdiscover
Our target ip is
192.168.128.70
>> Scan for open Ports and services with nmap
21/tcp open ftp vsFTPd 3.0.3
22/tcp open ssh
80/tcp open http
>> Check ftp connection with anonymous
Here we have User
matthewlooks intresting
>> Brute Force files and subdirectories with gobuster
here we have two intresting pages
/login.php&/create_account.phpBy creating account on
/create_account.phpwe will get the response which stores the some base64
The username and password stored in this pattern, username=xxxx&password=xxxx2024@four-digit random number
So, assume that user
matthewgenerated password the same way, so use crunch to generate list with same format.
>> Generate a dictionary list with crunch
Exploitation
>> Use hydra to crack passowrd of /login.php
>> Tried login via ssh in case matthew has reused password.
Well, We got the shell and our user flag!!
Privilege Escalation
>> Matthew has sudo permission to run /opt/superhack as any user.
By inspecting the script appears to be simple fake hacking tool.
Which just prints a string with progess bar and a message claiming that the target has been "PWNED"
This code itself is not offensive, but because it is executed by /bin/bash, it means that we can forge a file with the same name, execute the content written in the file, and then execute to obtain permissions.
We have both the flags!
Last updated