CyberSploit1
Started with a TCP scan via Nmap.
Starting Nmap 7.95 ( https://nmap.org ) at 2025-10-09 16:37 IST
Nmap scan report for 192.168.203.92
Host is up (0.073s latency).
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 5.9p1 Debian 5ubuntu1.10 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 1024 01:1b:c8:fe:18:71:28:60:84:6a:9f:30:35:11:66:3d (DSA)
| 2048 d9:53:14:a3:7f:99:51:40:3f:49:ef:ef:7f:8b:35:de (RSA)
|_ 256 ef:43:5b:d0:c0:eb:ee:3e:76:61:5c:6d:ce:15:fe:7e (ECDSA)
80/tcp open http Apache httpd 2.2.22 ((Ubuntu))
|_http-server-header: Apache/2.2.22 (Ubuntu)
|_http-title: Hello Pentester!
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 9.61 seconds
Visited the web page and found the following

3. I checked the source code of the page and found a username at the very end.

itsskvwas the username. Maybe it could be used to login via SSH on the target.Next I ran a directory scan via Gobuster and obtained the following results.
/robots.txt
/index
/hackerI checked
robots.txtand found a base64 encoded stringY3liZXJzcGxvaXR7eW91dHViZS5jb20vYy9jeWJlcnNwbG9pdH0=I decoded the string and got
cybersploit{youtube.com/c/cybersploit}I initially thought that this was nothing but just a way to promote the given Youtube channel hence I didn't pay much heed to it.
Next I tried logging in via SSH on user
itsskvbut I still had no password. I ran a Hydra scan on the SSH service but I found nothing.I then tried the decoded string from two steps before and it surprisingly worked.

I found the first flag in a
local.txtfile in the working directory.
Privilege Escalation
I ran a LinPeas scan and right in the very beginning found this.

The Linux version 3.13.0 was marked an exploitable vector, I looked online for possible kernel exploits for the version and found the following on Exploit DB. https://www.exploit-db.com/exploits/37292
It was a C script which could give an elevated shell. All that was required was to run the script via GCC.
I dowloaded the script and sent it to the target machine via HTTP. I checked initially if gcc was present on the target and hopefully it was.
I compiled the script using
gcc -o exp 37292.cand ran it

I had successfully got root access to the target. Next obvious step was to get the final flag which was sitting in the
/rootdirectory.
Last updated