mridulbhardwajj.medium.com

Doubletrouble 1 Walkthrough

Mridul Bhardwaj

Mridul Bhardwaj

Doubletrouble 1 walkthrough from vulnhub

Host discovery

Press enter or click to view image in full size

VM running on 192.168.2.4

Scanning target for further enumeration

Press enter or click to view image in full size

Port 80 open

Opening web page as port 80 is open

Press enter or click to view image in full size

Trying directory brute force using gobuster

Press enter or click to view image in full size

Endpoint with “secret”

Opening /secret endpoint

1 image in the endpoint

Opening image

Press enter or click to view image in full size

There is only an image in secret endpoint so, there is a great chance of steganography on image

Using stegseek to extract hidden file from image

Press enter or click to view image in full size

Logging in with details

Press enter or click to view image in full size

We have a endpoint to upload files to server

Upload option does not have a check over the files which are uploaded

Uploading reverse PHP shell

Listening with netcat
executing uploaded PHP shell

Got reverse shell

Press enter or click to view image in full size

Spawning user to shell

non root shell

Privilege escalation

Get Mridul Bhardwaj’s stories in your inbox

Join Medium for free to get updates from this writer.

Checking for programs which run with root privileges without password

Press enter or click to view image in full size

We got awk

Checking GTFOBins for awk

Press enter or click to view image in full size

We got Root shell

Inside root directory we have another machine

Press enter or click to view image in full size

Hosting the VM, it has a name “inner”

Scanning for VM

Press enter or click to view image in full size

192.168.2.5

Scanning services

This form is vulnerable to SQL injection

Found Database name using Sqlmap

Found table with name “users”

Press enter or click to view image in full size

Found table contains credentials

Press enter or click to view image in full size

Trying SSH using found users

Press enter or click to view image in full size

Got initial shell

Privilege Escalation

Kernel is vulnerable to Dirty cow exploit

Press enter or click to view image in full size

We can login with new user firefart with root privileges

Press enter or click to view image in full size

Press enter or click to view image in full size

We got the flag

Conclusion: This is an easy machine but getting machine inside a machine is quite exciting and new for me. Overall this was a great machine and it was fun to crack it.