
Let’s start with our nmap scan.
nmap -sV 10.10.55.215

I found that the machine has web service on port 80, so I can use my web browser to try to get something.

Nothing special!
Mmmmm… If I try to get robots.txt?*

Bad luck!!, the website doesn’t have it.
Now I’m going to try with gobuster and maybe I can get some directories
gobuster dir -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-medium.txt -u http://10.10.55.215/

Great! I found /island
I use this in my web browser again.

I can see the text is not complete, so I’m going to try to see the source code.
¡¡¡Bingo!!!

And now what? Is a good idea if I run gobuster again but this time in /Island directory

Perfect!! I found /2100 directory. I’m check the new directory in the browser.

I watched the video and It was not helpful, maybe I need to see the source code again.
Okay!!! I got something interesting.

I spent many hours thinking what can I do here?, so after a few hours I thought that .ticket could be an extension, but where could it be used? I’ll use this right here at /2100, following the advice I found in he source code.
So let’s try gobuster again
gobuster dir -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-medium.txt -u http://10.10.55.215/island/2100 -x .ticket

I found green_arrow.ticket and if I try to open the I find this.

I think the text is encrypt. Cipher are not a easy subject for me, so It will take me some time to get the correct way to decrypt the cipher. After some hours I found the correct way to decrypt the cipher using base58

Okay! Let’s try to login using FTP with the credentials that I found

Great!!! I’m in!!
I’m going to use ls for list all files and directories.

Downloading the images

Maybe the machine has other users, so It is a good idea to check home directory.

If I verify the images headers with exiftool I got this error in one of the three images

I’m goingt to fix the image usign hexedit but first I need the PNG Hex Gradient

Now I can fix the PNG image.

Using ** steghide ** for Verify if the images have embed information

Extracting the zip from aa.jpg
From the zip file I got the files passwd.txt and shado

I think that I have the corrects shh credentias.
I log in with with the ssh credentials and I run ls command to try to get user.txt

I got it!!!
So now I’m going to verify if i can run sudo command.
This is interesting, I can run pkexec with sudo.

sudo pkexec --user root /bin/bash
Perfect!! I found root.txt

Happy Hacking!!!