![]() ![]() In the end, to get our final flag, we used docker but there is an issue with the docker that all the commands in docker require sudo as docker needs root to run. To proceed with our privilege escalation, we tried a few things but didn’t work out. Fuzzing and Checking for RCE using Curl.We will be downloading the lab file from this link. ![]() Since these labs are available on the Vulnhub Website. The ultimate goal of this challenge is to get root and to read the root flag. It is of intermediate level and is very handy in order to brush up your skills as a penetration tester. This VM is a purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing. Let’s start by scanning the network for targets using Netdiscover. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |